Skip to content
This repository was archived by the owner on Oct 14, 2020. It is now read-only.

Commit e824f7d

Browse files
committed
Fix trivy link wording
1 parent 38535ed commit e824f7d

File tree

1 file changed

+5
-8
lines changed

1 file changed

+5
-8
lines changed

scanners/trivy/README.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ A software vulnerability is a glitch, flaw, or weakness present in the software
1313
`Trivy` detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.).
1414
`Trivy` is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify a target such as an image name of the container.
1515

16-
To learn more about the Trivy scanner itself visit or [Trivy GitHub].
16+
To learn more about the Trivy scanner itself visit on [Trivy's GitHub Repository](https://github.com/aquasecurity/trivy).
1717

1818
<!-- end -->
1919

@@ -29,10 +29,7 @@ helm upgrade --install trivy ./scanners/trivy/
2929

3030
The following security scan configuration example are based on the [Trivy Documentation], please take a look at the original documentation for more configuration examples.
3131

32-
* Filter the vulnerabilities by severities `trivy image --severity HIGH,CRITICAL ruby:2.4.0`
33-
* Filter the vulnerabilities by type (`os` or `library`) `trivy image --vuln-type os ruby:2.4.0`
34-
* Skip update of vulnerability DB: `trivy image --skip-update python:3.4-alpine3.9`
35-
* Ignore unfixed vulnerabilities:`trivy image --ignore-unfixed ruby:2.4.0` By default, Trivy also detects unpatched/unfixed vulnerabilities. This means you can't fix these vulnerabilities even if you update all packages. If you would like to ignore them, use the `--ignore-unfixed` option.
36-
37-
[Trivy GitHub]: https://github.com/aquasecurity/trivy
38-
[Trivy Documentation]: https://github.com/aquasecurity/trivy#examples
32+
- Filter the vulnerabilities by severities `trivy image --severity HIGH,CRITICAL ruby:2.4.0`
33+
- Filter the vulnerabilities by type (`os` or `library`) `trivy image --vuln-type os ruby:2.4.0`
34+
- Skip update of vulnerability DB: `trivy image --skip-update python:3.4-alpine3.9`
35+
- Ignore unfixed vulnerabilities:`trivy image --ignore-unfixed ruby:2.4.0` By default, Trivy also detects unpatched/unfixed vulnerabilities. This means you can't fix these vulnerabilities even if you update all packages. If you would like to ignore them, use the `--ignore-unfixed` option.

0 commit comments

Comments
 (0)