trivy-ecr-scan
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Name:trivy-ecr-scan
Category:Containers
Publisher:trickest-mhmdiaa
Created:6/7/2022
Container:
quay.io/trickest/trivy-ecr-scan:v0.24.4
Output Type:
License:Unknown
Source:View Source
Parameters
--light
deprecated (default: false) [$TRIVY_LIGHT]--format
format (table, json, sarif, template) (default: table) [$TRIVY_FORMAT]--timeout
timeout (default: 5m0s) [$TRIVY_TIMEOUT]--insecure
allow insecure server connections when using SSL (default: false) [$TRIVY_INSECURE]--severity
severities of vulnerabilities to be displayed (comma separated) (default: UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL) [$TRIVY_SEVERITY]--exit-code
Exit code when vulnerabilities were found (default: 0) [$TRIVY_EXIT_CODE]--skip-dirs
specify the directories where the traversal is skipped [$TRIVY_SKIP_DIRS]--vuln-type
comma-separated list of vulnerability types (os,library) (default: os,library) [$TRIVY_VULN_TYPE]
List of images line by line to be scanned--skip-files
specify the file paths to skip traversal [$TRIVY_SKIP_FILES]--no-progress
suppress progress bar (default: false) [$TRIVY_NO_PROGRESS]--removed-pkgs
detect vulnerabilities of removed packages (only for Alpine) (default: false) [$TRIVY_REMOVED_PKGS]--ignore-policy
specify the Rego file to evaluate each vulnerability [$TRIVY_IGNORE_POLICY]--list-all-pkgs
enabling the option will output all packages regardless of vulnerability (default: false) [$TRIVY_LIST_ALL_PKGS]--ignore-unfixed
display only fixed vulnerabilities (default: false) [$TRIVY_IGNORE_UNFIXED]--skip-db-update
skip updating vulnerability database (default: false) [$TRIVY_SKIP_UPDATE, $TRIVY_SKIP_DB_UPDATE]
Credentials to be used to log into ECR. Format: 'AWS_ACCESS_KEY_ID:AWS_SECRET_ACCESS_KEY:AWS_DEFAULT_REGION' (colon-separated)--security-checks
comma-separated list of what security issues to detect (vuln,config) (default: vuln) [$TRIVY_SECURITY_CHECKS]