A comprehensive security scanner that finds vulnerabilities, misconfigurations, secrets, and SBOMs in containers, Kubernetes, code, and clouds.
Trivy is a comprehensive open-source security scanner that finds vulnerabilities, misconfigurations, secrets, and generates SBOMs across various targets like containers, Kubernetes, filesystems, and Git repositories. It consolidates multiple security checks into a single tool to help secure the software supply chain from development to runtime.
DevOps engineers, security teams, and developers who need to integrate security scanning into CI/CD pipelines, containerized environments, and cloud-native infrastructure.
Developers choose Trivy for its all-in-one approach, ease of use, broad target and scanner support, and seamless integration with popular platforms and tools, eliminating the need for multiple specialized security scanners.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Consolidates vulnerability, misconfiguration, secret, and SBOM scanning into a single command-line tool, reducing the need for multiple specialized scanners.
Scans container images, filesystems, Git repositories, VM images, and Kubernetes clusters, as detailed in the README's target list.
Offers pre-built integrations with GitHub Actions, a Kubernetes operator, and VS Code, making it easy to embed into existing workflows.
Can be installed via package managers like brew, run as a Docker container, or downloaded as a binary, ensuring flexibility across environments.
Canary builds are generated with every commit and may contain critical bugs, explicitly not recommended for production use, as warned in the README.
Advanced features and enterprise-grade management are reserved for Aqua, the commercial product, creating a potential vendor lock-in for teams needing more than basic scanning.
Primarily operates via command-line, which might limit adoption in teams accustomed to GUI-based security dashboards, despite some plugin support.