Signature Verification¶
All binaries and container images are signed by Cosign.
Verifying container image¶
Use the following command for keyless verification:
cosign verify aquasec/trivy:<version> \
--certificate-identity-regexp 'https://github\.com/aquasecurity/trivy/\.github/workflows/.+' \
--certificate-oidc-issuer "https://token.actions.githubusercontent.com"
You should get the following output
Verification for index.docker.io/aquasec/trivy:latest --
The following checks were performed on each of these signatures:
- The cosign claims were validated
- Existence of the claims in the transparency log was verified offline
- The code-signing certificate was verified using trusted certificate authority certificates
....
Verifying binary¶
Download the required tarball, associated signature and certificate files from the GitHub Release.
Use the following command for keyless verification:
cosign verify-blob <path to binray> \
--certificate <path to cert> \
--signature <path to sig> \
--certificate-identity-regexp 'https://github\.com/aquasecurity/trivy/\.github/workflows/.+' \
--certificate-oidc-issuer "https://token.actions.githubusercontent.com"
You should get the following output
Verified OK
Verifying a GPG signature¶
RPM and Deb packages are also signed by GPG.
Verifying RPM¶
The public key is available at https://aquasecurity.github.io/trivy-repo/rpm/public.key.
First, download and import the key:
curl https://aquasecurity.github.io/trivy-repo/rpm/public.key \
--output pub.key
rpm --import pub.key
rpm -q --queryformat "%{SUMMARY}\n" $(rpm -q gpg-pubkey)
You should get the following output:
gpg(trivy)
Then you can verify the signature:
curl -L https://github.com/aquasecurity/trivy/releases/download/<version>/<file name>.rpm \
--output trivy.rpm
rpm -K trivy.rpm
You should get the following output
trivy.rpm: digests signatures OK