You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Oct 14, 2020. It is now read-only.
Copy file name to clipboardExpand all lines: scanners/trivy/README.md
+5-8Lines changed: 5 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ A software vulnerability is a glitch, flaw, or weakness present in the software
13
13
`Trivy` detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.).
14
14
`Trivy` is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify a target such as an image name of the container.
15
15
16
-
To learn more about the Trivy scanner itself visit or[Trivy GitHub].
16
+
To learn more about the Trivy scanner itself visit on[Trivy's GitHub Repository](https://github.com/aquasecurity/trivy).
The following security scan configuration example are based on the [Trivy Documentation], please take a look at the original documentation for more configuration examples.
31
31
32
-
* Filter the vulnerabilities by severities `trivy image --severity HIGH,CRITICAL ruby:2.4.0`
33
-
* Filter the vulnerabilities by type (`os` or `library`) `trivy image --vuln-type os ruby:2.4.0`
34
-
* Skip update of vulnerability DB: `trivy image --skip-update python:3.4-alpine3.9`
35
-
* Ignore unfixed vulnerabilities:`trivy image --ignore-unfixed ruby:2.4.0` By default, Trivy also detects unpatched/unfixed vulnerabilities. This means you can't fix these vulnerabilities even if you update all packages. If you would like to ignore them, use the `--ignore-unfixed` option.
- Filter the vulnerabilities by severities `trivy image --severity HIGH,CRITICAL ruby:2.4.0`
33
+
- Filter the vulnerabilities by type (`os` or `library`) `trivy image --vuln-type os ruby:2.4.0`
34
+
- Skip update of vulnerability DB: `trivy image --skip-update python:3.4-alpine3.9`
35
+
- Ignore unfixed vulnerabilities:`trivy image --ignore-unfixed ruby:2.4.0` By default, Trivy also detects unpatched/unfixed vulnerabilities. This means you can't fix these vulnerabilities even if you update all packages. If you would like to ignore them, use the `--ignore-unfixed` option.
0 commit comments