Skip to main content
Glama
README.md6.42 kB
<img src="docs/imgs/logo.png" width="150"> [![GitHub Release][release-img]][release] [![Go Report Card](https://goreportcard.com/badge/github.com/aquasecurity/trivy)](https://goreportcard.com/report/github.com/aquasecurity/trivy) [![License: Apache-2.0](https://img.shields.io/badge/License-Apache%202.0-blue.svg)][license] [![codecov](https://codecov.io/gh/aquasecurity/trivy/branch/main/graph/badge.svg)](https://codecov.io/gh/aquasecurity/trivy) [![GitHub All Releases][github-all-releases-img]][release] ![Docker Pulls][docker-pulls] [release]: https://github.com/aquasecurity/trivy/releases [release-img]: https://img.shields.io/github/release/aquasecurity/trivy.svg?logo=github [github-all-releases-img]: https://img.shields.io/github/downloads/aquasecurity/trivy/total?logo=github [docker-pulls]: https://img.shields.io/docker/pulls/aquasec/trivy?logo=docker&label=docker%20pulls%20%2F%20trivy [license]: https://github.com/aquasecurity/trivy/blob/main/LICENSE A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CI. # Abstract `Trivy` (`tri` pronounced like **tri**gger, `vy` pronounced like en**vy**) is a simple and comprehensive vulnerability scanner for containers and other artifacts. A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. `Trivy` detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). `Trivy` is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify a target such as an image name of the container. <img src="docs/imgs/overview.png" width="700"> Trivy can be run in two different modes: - [Standalone](https://aquasecurity.github.io/trivy/latest/modes/standalone/) - [Client/Server](https://aquasecurity.github.io/trivy/latest/modes/client-server/) Trivy can scan three different artifacts: - [Container Images](https://aquasecurity.github.io/trivy/latest/scanning/image/) - [Filesystem](https://aquasecurity.github.io/trivy/latest/scanning/filesystem/) - [Git Repositories](https://aquasecurity.github.io/trivy/latest/scanning/git-repository/) <img src="docs/imgs/usage.gif" width="700"> <img src="docs/imgs/usage1.png" width="600"> <img src="docs/imgs/usage2.png" width="600"> It is considered to be used in CI. Before pushing to a container registry or deploying your application, you can scan your local container image and other artifacts easily. See [here](https://aquasecurity.github.io/trivy/latest/integrations/) for details. # Features - Detect comprehensive vulnerabilities - OS packages (Alpine, **Red Hat Universal Base Image**, Red Hat Enterprise Linux, CentOS, Oracle Linux, Debian, Ubuntu, Amazon Linux, openSUSE Leap, SUSE Enterprise Linux, Photon OS and Distroless) - **Application dependencies** (Bundler, Composer, Pipenv, Poetry, npm, yarn, Cargo, NuGet, Maven, and Go) - Simple - Specify only an image name or artifact name - See [Quick Start](#quick-start) and [Examples](#examples) - Fast - The first scan will finish within 10 seconds (depending on your network). Consequent scans will finish in single seconds. - Unlike other scanners that take long to fetch vulnerability information (~10 minutes) on the first run, and encourage you to maintain a durable vulnerability database, Trivy is stateless and requires no maintenance or preparation. - Easy installation - `apt-get install`, `yum install` and `brew install` is possible (See [Installation](#installation)) - **No pre-requisites** such as installation of DB, libraries, etc. - High accuracy - **Especially Alpine Linux and RHEL/CentOS** - Other OSes are also high - DevSecOps - **Suitable for CI** such as Travis CI, CircleCI, Jenkins, GitLab CI, etc. - See [CI Example](#continuous-integration-ci) - Support multiple formats - container image - A local image in Docker Engine which is running as a daemon - A local image in Podman (>=2.0) which is exposing a socket - A remote image in Docker Registry such as Docker Hub, ECR, GCR and ACR - A tar archive stored in the `docker save` / `podman save` formatted file - An image directory compliant with [OCI Image Format](https://github.com/opencontainers/image-spec) - local filesystem - remote git repository Please see [LICENSE][license] for Trivy licensing information. Note that Trivy uses vulnerability information from a variety of sources, some of which are licensed for non-commercial use only. # Documentation The official documentation, which provides detailed installation, configuration, and quick start guides, is available at https://aquasecurity.github.io/trivy/. # Installation See [here](https://aquasecurity.github.io/trivy/latest/installation/) # Quick Start Simply specify an image name (and a tag). ``` $ trivy image [YOUR_IMAGE_NAME] ``` For example: ``` $ trivy image python:3.4-alpine ``` <details> <summary>Result</summary> ``` 2019-05-16T01:20:43.180+0900 INFO Updating vulnerability database... 2019-05-16T01:20:53.029+0900 INFO Detecting Alpine vulnerabilities... python:3.4-alpine3.9 (alpine 3.9.2) =================================== Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0) +---------+------------------+----------+-------------------+---------------+--------------------------------+ | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE | +---------+------------------+----------+-------------------+---------------+--------------------------------+ | openssl | CVE-2019-1543 | MEDIUM | 1.1.1a-r1 | 1.1.1b-r1 | openssl: ChaCha20-Poly1305 | | | | | | | with long nonces | +---------+------------------+----------+-------------------+---------------+--------------------------------+ ``` </details> # Examples See [here](https://aquasecurity.github.io/trivy/latest/examples/filter/) # Continuous Integration (CI) See [here](https://aquasecurity.github.io/trivy/latest/integrations/) # Vulnerability Detection See [here](https://aquasecurity.github.io/trivy/latest/vuln-detection/) # Usage See [here](https://aquasecurity.github.io/trivy/latest/usage/) # Author [Teppei Fukuda](https://github.com/knqyf263) (knqyf263)

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/michoo/security_mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server