v0.37.0 #3518
aqua-bot
announced in
Announcements
v0.37.0
#3518
Replies: 2 comments 2 replies
-
Well done @knqyf263, @DmitriyLewen & Co. Huzzah! |
Beta Was this translation helpful? Give feedback.
1 reply
-
Hi, since this version released my Trivy scans are taking 4 minutes as opposed to the 30 second I'd been seeing before. Here are the scans I'm performing in a pipeline:
Any idea what might've changed that would cause this? Or how I can decrease scan times again? |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
🛫 Deprecation 🌆
--security-checks
flag--security-checks
was renamed to--scanners
.#3519
🚀 What's new? 🚀
🧾 Complete CIS Kubernetes Benchmark (include host-level checks ) ⎈
This release provides the complete CIS Kubernetes Benchmark report including "host-level checks" which bring Trivy compatible with kube-bench.
You can see more details here.
🐳 Docker CIS Benchmark 📝
Trivy support Docker CIS Benchmark. You can enable it with
--compliance docker-cis
. It detects issues on container images.See here for the detail.
👮♂️ Misconfiguration scanning on container image config 🤘
Trivy now detects misconfigurations on image configuration.
--image-config-scanners config
enables this feature. Trivy tries to restore the original Dockerfile from the configuration and scan against it. You can see the history withdocker history [YOUR_IMAGE_NAME]
.The above example passes
--scanners none
so it can disable scanners on files inside the container image, but you can also enable it liketrivy --scanners vuln --image-config-scanners config [YOUR_IMAGE_NAME]
.See here for the detail.
🔒 Secret scanning on container image config ㊙️
Trivy now detects secrets on image configuration.
--image-config-scanners secret
enables this feature. It is especially useful to detect credentials in environmental variables. You can see the environmental variables of your image withdocker inspect [YOUR_IMAGE_NAME]
.The above example passes
--scanners none
so it can disable scanners on files inside the container image, but you can also enable it liketrivy --scanners vuln --image-config-scanners secret [YOUR_IMAGE_NAME]
.See here for the detail.
🐍 Conda support for SBOM
Trivy looks for conda packages in container images (and root fileysystem), extract the information and put them into SBOM.
🎯 Dart (pubspec.lock) support for vulnerability detection
Trivy now scans pubspec.lock for vulnerabilities.
☕ Java Index Database 🍡
Trivy used to rely on the third-party API for JAR (Java) scanning. It was leading to slow and unstable scanning. See here for the detail. The
--offline-scan
flag mitigates the issues, but the result accuracy gets worse.After all, we decided to build the Java index database and distribute it [on GitHub(https://github.com/aquasecurity/trivy-java-db). When Trivy finds JAR files while scanning, it downloads the Java database and use it for JAR scanning. It means you can get accurate results even under air-gapped environment if you download the Java database and put it in advance.
--download-java-db-only
and--skip-java-db-update
flags like the vulnerability database were also added.See here for more details.
📈 Automatic policy bundle fetching
This release adds the ability for Trivy to fetch newly published polices, when needed, automatically as a bundle.
Yo can disable this behaviour with the
--skip-policy-update
flag. In this case Trivy will use embedded polices as it does today.🧩 Improved schema support for policies
This release enables support for Rego schema input via Rego Metadata as per the OPA convention
Where the
foo
directory holds a custom user defined schemaThis discussion was created from the release v0.37.0.
Beta Was this translation helpful? Give feedback.
All reactions