trivy-image-scan
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Name:trivy-image-scan
Category:Containers
Publisher:trickest-mhmdiaa
Created:4/28/2022
Container:
quay.io/trickest/trivy-image-scan:v0.34.0-patch-3
Output Type:
License:Unknown
Source:View Source
Parameters
--debug
debug mode--quiet
suppress progress bar and log output--reset
remove all caches and database--token
for authentication in client/server mode--trace
enable more verbose trace output for custom queries--config
config path (default trivy.yaml)--format
format (table, json, sarif, template, cyclonedx, spdx, spdx-json, github, cosign-vuln) (default table)--server
server address in client mode--tf-vars
specify paths to override the Terraform tfvars files--timeout
timeout (default: 5m0s)--helm-set
specify Helm values (can separate values with commas: key1=val1,key2=val2)--insecure
allow insecure server connections when using TLS--platform
set platform in the form os/arch if image is multi-platform capable--redis-ca
redis ca file location, if using redis as cache backend--severity
severities of vulnerabilities to be displayed (comma separated) (default: UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL)--template
output template--cache-ttl
cache TTL when using redis as cache backend--exit-code
Exit code when vulnerabilities are found--redis-key
redis key file location, if using redis as cache backend--rekor-url
[EXPERIMENTAL] address of rekor STL server (default https://rekor.sigstore.dev)--skip-dirs
specify the directories where the traversal is skipped--vuln-type
comma-separated list of vulnerability types (os,library)--compliance
comma-separated list of what compliance reports to generate (nsa)--ignorefile
specify .trivyignore file (default .trivyignore)
List of images line by line to be scanned--redis-cert
redis certificate file location, if using redis as cache backend--skip-files
specify the file paths to skip traversal--clear-cache
clear image caches without scanning--config-data
specify paths from which data for the Rego policies will be recursively loaded--helm-values
specify paths to override the Helm values.yaml files--license-full
eagerly look for licenses in source code headers and license files--offline-scan
do not issue API requests to identify dependencies--removed-pkgs
detect vulnerabilities of removed packages (only for Alpine)--sbom-sources
[EXPERIMENTAL] try to retrieve SBOM from the specified sources (rekor)--token-header
specify a header name for token in client/server mode (default Trivy-Token)--cache-backend
cache backend (e.g. redis://localhost:6379) (default fs)--config-policy
specify paths to the Rego policy files directory, applying config files--db-repository
OCI repository to retrieve trivy-db from (default ghcr.io/aquasecurity/trivy-db)--file-patterns
specify config file patterns--ignore-policy
specify the Rego file to evaluate each vulnerability--list-all-pkgs
enabling the option will output all packages regardless of vulnerability--secret-config
specify a path to config file for secret scanning (default trivy-secret.yaml)--no-progress
suppress progress bar--custom-headers
custom headers in client mode--ignore-unfixed
display only fixed vulnerabilities--skip-db-update
skip updating vulnerability database--dependency-tree
[EXPERIMENTAL] show dependency origin tree of vulnerable packages--helm-set-string
specify Helm string values on the command line (can specify multiple or separate values with commas: key1=val1,key2=val2)--security-checks
comma-separated list of what security issues to detect (vuln,config,secret,license) (default [vuln,secret])--download-db-only
download/update vulnerability database but don't run a scan--ignored-licenses
specify a list of license to ignore--policy-namespaces
Rego namespaces
Username and password for Docker Hub registry (format username:password)--include-non-failures
include successes and exceptions, available with '--security-checks config'