Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers and other artifacts. A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). Trivy is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify a target such as an image name of the container
Go to file
scm-staging-bot d8f8f9dea5 Merge pull request 'Update to 0.49.1' (#5) from dirkmueller/trivy:factory into factory 2024-02-09 23:54:47 +01:00
.gitattributes Accepting request 842569 from devel:kubic 2020-10-20 14:13:13 +00:00
_constraints OBS-URL: https://build.opensuse.org/package/show/Virtualization:containers/trivy?expand=0&rev=51 2023-03-14 10:01:30 +00:00
_scmsync.obsinfo [info=fe5cccdebe8c3f80a50568289bbf4e65174e54d1] 2023-08-16 16:34:28 +00:00
_service Update to 0.49.1 2024-02-08 14:51:16 +01:00
_servicedata Update to 0.49.1 2024-02-08 14:51:16 +01:00
trivy-0.49.1.tar.zst Update to 0.49.1 2024-02-08 14:51:16 +01:00
trivy.changes Update to 0.49.1 2024-02-08 14:51:16 +01:00
trivy.spec Update to 0.49.1 2024-02-08 14:51:16 +01:00
vendor.tar.zst Update to 0.49.1 2024-02-08 14:51:16 +01:00