|
1 | 1 | # Vulnerability Scanning
|
2 |
| -Trivy detects known vulnerabilities according to the versions of installed packages. |
| 2 | +Trivy detects known vulnerabilities in software components that it finds in the scan target. |
3 | 3 |
|
4 |
| -The following packages are supported. |
| 4 | +The following are supported: |
5 | 5 |
|
6 | 6 | - [OS packages](#os-packages)
|
7 | 7 | - [Language-specific packages](#language-specific-packages)
|
8 |
| -- [Kubernetes components (control plane, node and addons)](#kubernetes) |
9 |
| - |
10 |
| -Trivy also detects known vulnerabilities in Kubernetes components using KBOM (Kubernetes bill of Material) scanning. To learn more, see the [documentation for Kubernetes scanning](../target/kubernetes.md#KBOM). |
| 8 | +- [Non-packaged software](#non-packaged-software) |
| 9 | +- [Kubernetes components](#kubernetes) |
11 | 10 |
|
12 | 11 | ## OS Packages
|
13 | 12 | Trivy is capable of automatically detecting installed OS packages when scanning container images, VM images and running hosts.
|
@@ -138,9 +137,18 @@ See [here](../coverage/language/index.md#supported-languages) for the supported
|
138 | 137 |
|
139 | 138 | [^1]: Intentional delay between vulnerability disclosure and registration in the DB
|
140 | 139 |
|
| 140 | +## Non-packaged software |
| 141 | + |
| 142 | +If you have software that is not managed by a package manager, Trivy can still detect vulnerabilities in it in some cases: |
| 143 | + |
| 144 | +- [Using SBOM from Sigstore Rekor](../supply-chain/attestation/rekor/#non-packaged-binaries) |
| 145 | +- [Go Binaries with embedded module information](../coverage/language/golang/#go-binaries) |
| 146 | +- [Rust Binaries with embedded information](../coverage/language/rust/#binaries) |
| 147 | +- [SBOM embedded in container images](../supply-chain/container-image/#sbom-embedded-in-container-images) |
| 148 | + |
141 | 149 | ## Kubernetes
|
142 | 150 |
|
143 |
| -Trivy can detect vulnerabilities in Kubernetes clusters and components. |
| 151 | +Trivy can detect vulnerabilities in Kubernetes clusters and components by scanning a Kubernetes Cluster, or a KBOM (Kubernetes bill of Material). To learn more, see the [documentation for Kubernetes scanning](../target/kubernetes.md). |
144 | 152 |
|
145 | 153 | ### Data Sources
|
146 | 154 |
|
|
0 commit comments