Overview
trivy
Unified security scanner
Synopsis
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues and hard-coded secrets
trivy [global flags] command [flags] target
Examples
  # Scan a container image
  $ trivy image python:3.4-alpine
  # Scan a container image from a tar archive
  $ trivy image --input ruby-3.1.tar
  # Scan local filesystem
  $ trivy fs .
  # Run in server mode
  $ trivy server
Options
      --cache-dir string          cache directory (default "/path/to/cache")
  -c, --config string             config path (default "trivy.yaml")
  -d, --debug                     debug mode
  -f, --format string             version format (json)
      --generate-default-config   write the default config to trivy-default.yaml
  -h, --help                      help for trivy
      --insecure                  allow insecure server connections
  -q, --quiet                     suppress progress bar and log output
      --timeout duration          timeout (default 5m0s)
  -v, --version                   show version
SEE ALSO
- trivy clean - Remove cached files
- trivy config - Scan config files for misconfigurations
- trivy convert - Convert Trivy JSON report into a different format
- trivy filesystem - Scan local filesystem
- trivy image - Scan a container image
- trivy kubernetes - [EXPERIMENTAL] Scan kubernetes cluster
- trivy module - Manage modules
- trivy plugin - Manage plugins
- trivy registry - Manage registry authentication
- trivy repository - Scan a repository
- trivy rootfs - Scan rootfs
- trivy sbom - Scan SBOM for vulnerabilities and licenses
- trivy server - Server mode
- trivy version - Print the version
- trivy vex - [EXPERIMENTAL] VEX utilities
- trivy vm - [EXPERIMENTAL] Scan a virtual machine image