A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI. Abstract Trivy ( tri pronounced like tri gger, vy pronounced like en vy ) is a simple and comprehensive vulnerability scanner for containers. A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn etc.). Trivy is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify an image name of container. It is considered to be used in CI. Before pushing to a container registry, you can scan your local container image easily. See here for details. Features Detect comprehensive vulnerabilities OS packages (Alpine, Red Hat Universal Base Image , Red Hat Enterprise Linux, CentOS, Debian and Ubuntu) Application dependencies (Bundler, Composer, Pipenv, Poetry, npm, yarn and Cargo) Simple Specify only an image name See Quick Start and Examples Easy installation apt-get install , yum install and brew install is possible (See Installation ) No need for prerequirements such as installation of DB, libraries, etc. (The exception is that you need rpm installed to scan images based on RHEL/CentOS. This is automatically included if you use our installers or the Trivy container image. See Vulnerability Detection for…
http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png 0 0 govanguard http://govanguard.com/wp-content/uploads/2018/04/Header_Logo.png govanguard2019-11-05 07:00:002019-11-05 07:00:00Trivy - A Simple And Comprehensive Vulnerability Scanner For Containers, Suitable For CI
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email email@example.com