You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When scanning a directory using trivy fs, Trivy now automatically sets the artifact type in the scan report to repository if the target is a git repository. This behavior is automatic — no configuration needed.
🧬 Vulnerability Fingerprint Generation 🆔
Trivy now generates unique fingerprints for each detected vulnerability, enabling consistent tracking across multiple scans.
Each fingerprint is a deterministic SHA256 digest derived from:
Artifact ID
Target path
Package ID (with version)
Vulnerability ID
The resulting value uses the sha256: prefix, consistent with Docker/OCI digest notation.
Trivy can now builds a dependency tree for .NET *.deps.json files.
It also detects the project’s package (RootRelationship), as well as direct and indirect dependencies.
It’s no longer necessary to specify each SPDX expression individually to ignore them.
You can specify SPDX IDs, and if Trivy finds all of them in an expression, it’ll ignore that license.
For example you can use --ignored-licenses LGPLv2+,MIT to ignore MIT AND GPL-2.0-or-later expression.
The conventional SSL_CERT_FILE environment variable didn't work consistently across all operating systems. We have now added the --cacert flag, which allows you to specify the path to a PEM-encoded CA certificate file on any OS.
🪪 SPDX Attestation Support Added 🧷
Trivy now supports scanning SBOM attestations in SPDX 2.3 format — specifically when wrapped as a DSSE (in-toto) envelope.
You can now set the limit for the number of Rego compile errors allowed during policy compilation (currently set to 10 by default) using the --rego-error-limit flag. Rego compiliation errors can legitimately occur when using newer checks with older versions of Trivy, in which case checks might refer to fields which weren't supported. If the number of errors exceeds the specified limit, Trivy will stop the scan. Setting it to 0 enforces strict checking and disallows any compile errors.
🧩 Accurate YAML snippets ✅
Trivy now captures the correct start line for map nodes in YAML manifests. Previously, snippets showin in misconfiguration scanning results began at the first value and did not include the key, which could make diagnostics harder.
Before:
4 [ name: hello-host-ports
After:
3 ┌ metadata:
4 └ name: hello-host-ports
🗄️ Concurrent Vulnerability DB Access ⚡
Trivy’s vulnerability database is now opened in read-only mode, allowing multiple Trivy processes to access the same database concurrently without running into lock timeouts. This is especially useful when running parallel scans or using Trivy in multi-process environments.
When using in-memory caching (e.g., fs, rootfs, config, sbom) or Redis caching, scans can run entirely in parallel without contention.
When using the filesystem cache (e.g, image, repo), cache files still involve write operations, so file locks may occur. Parallelism is therefore limited by cache writes, not the vulnerability database.
When scanning a directory using trivy fs, Trivy now automatically sets the artifact type in the scan report to repository if the target is a git repository. This behavior is automatic — no configuration needed.
🧬 Vulnerability Fingerprint Generation 🆔
Trivy now generates unique fingerprints for each detected vulnerability, enabling consistent tracking across multiple scans.
Each fingerprint is a deterministic SHA256 digest derived from:
Artifact ID
Target path
Package ID (with version)
Vulnerability ID
The resulting value uses the sha256: prefix, consistent with Docker/OCI digest notation.
The conventional SSL_CERT_FILE environment variable didn't work consistently across all operating systems. We have now added the --cacert flag, which allows you to specify the path to a PEM-encoded CA certificate file on any OS.
🪪 SPDX Attestation Support Added 🧷
Trivy now supports scanning SBOM attestations in SPDX 2.3 format — specifically when wrapped as a DSSE (in-toto) envelope.
You can now set the limit for the number of Rego compile errors allowed during policy compilation (currently set to 10 by default) using the --rego-error-limit flag. Rego compiliation errors can legitimately occur when using newer checks with older versions of Trivy, in which case checks might refer to fields which weren't supported. If the number of errors exceeds the specified limit, Trivy will stop the scan. Setting it to 0 enforces strict checking and disallows any compile errors.
🧩 Accurate YAML snippets ✅
Trivy now captures the correct start line for map nodes in YAML manifests. Previously, snippets showin in misconfiguration scanning results began at the first value and did not include the key, which could make diagnostics harder.
Before:
4 [ name: hello-host-ports
After:
3 ┌ metadata:
4 └ name: hello-host-ports
🗄️ Concurrent Vulnerability DB Access ⚡
Trivy’s vulnerability database is now opened in read-only mode, allowing multiple Trivy processes to access the same database concurrently without running into lock timeouts. This is especially useful when running parallel scans or using Trivy in multi-process environments.
When using in-memory caching (e.g., fs, rootfs, config, sbom) or Redis caching, scans can run entirely in parallel without contention.
When using the filesystem cache (e.g, image, repo), cache files still involve write operations, so file locks may occur. Parallelism is therefore limited by cache writes, not the vulnerability database.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
📑 Table of Contents
--cacertflag ⛔🚀 What's new? 🚀
🧩 Scan report identification fields 📊
Scan reports now includes the following identification fields to help track, manage and process reports:
Example:
{ "SchemaVersion": 2, "ReportID": "278d4718-2366-46d0-8525-fc288c4eb5f9", "ArtifactID": "sha256:055936d39205...", "ArtifactName": "debian:11", "ArtifactType": "container_image", "Metadata": { "ImageID": "sha256:e7b300aee9f9b...", "Reference": "debian:11", "RepoTags": ["debian:latest", "debian:11"] } }🐳 Preserve RepoTags in Docker archive 🏷️
Trivy now preserves image repository tags when scanning Docker archives (
.tarfiles created withdocker save,skopeo copy, etc).Example:
🧩 Scan fs as git Repositories 📁
When scanning a directory using
trivy fs, Trivy now automatically sets the artifact type in the scan report torepositoryif the target is a git repository. This behavior is automatic — no configuration needed.🧬 Vulnerability Fingerprint Generation 🆔
Trivy now generates unique fingerprints for each detected vulnerability, enabling consistent tracking across multiple scans.
Each fingerprint is a deterministic SHA256 digest derived from:
The resulting value uses the
sha256:prefix, consistent with Docker/OCI digest notation.Example:
🌳 Dependency tree for .NET 📦
Trivy can now builds a dependency tree for .NET
*.deps.jsonfiles.It also detects the project’s package (RootRelationship), as well as direct and indirect dependencies.
Thanks to @alexinslc
⚙️ Java remote repositories🫙
Trivy now uses remote repositories from
settings.xmlfiles when scanningpom.xmlfiles.Thanks to @ricardo-kh
📜 Easier to ignore licenses detection 🪪
It’s no longer necessary to specify each SPDX expression individually to ignore them.
You can specify SPDX IDs, and if Trivy finds all of them in an expression, it’ll ignore that license.
For example you can use
--ignored-licenses LGPLv2+,MITto ignoreMIT AND GPL-2.0-or-laterexpression.Thanks to @yutatokoi
🏴 New
--cacertflag ⛔The conventional
SSL_CERT_FILEenvironment variable didn't work consistently across all operating systems. We have now added the--cacertflag, which allows you to specify the path to a PEM-encoded CA certificate file on any OS.🪪 SPDX Attestation Support Added 🧷
Trivy now supports scanning SBOM attestations in SPDX 2.3 format — specifically when wrapped as a DSSE (in-toto) envelope.
🧾 Supoprt SBOM files in Sigstore bundle 🔐
Trivy can now extract and analyze SBOM files packaged as a Sigstore bundle, as introduced in Sigstore v2.6.
Thanks to @RingoDev
You can now set the limit for the number of Rego compile errors allowed during policy compilation (currently set to 10 by default) using the
--rego-error-limitflag. Rego compiliation errors can legitimately occur when using newer checks with older versions of Trivy, in which case checks might refer to fields which weren't supported. If the number of errors exceeds the specified limit, Trivy will stop the scan. Setting it to 0 enforces strict checking and disallows any compile errors.🧩 Accurate YAML snippets ✅
Trivy now captures the correct start line for map nodes in YAML manifests. Previously, snippets showin in misconfiguration scanning results began at the first value and did not include the key, which could make diagnostics harder.
Before:
After:
🗄️ Concurrent Vulnerability DB Access ⚡
Trivy’s vulnerability database is now opened in read-only mode, allowing multiple Trivy processes to access the same database concurrently without running into lock timeouts. This is especially useful when running parallel scans or using Trivy in multi-process environments.
When using in-memory caching (e.g., fs, rootfs, config, sbom) or Redis caching, scans can run entirely in parallel without contention.
When using the filesystem cache (e.g, image, repo), cache files still involve write operations, so file locks may occur. Parallelism is therefore limited by cache writes, not the vulnerability database.
👷♂️ Notable Fixes 🛠️
--detection-priority comprehensiveflag. #9609 Thanks to @raghur-orcatrueas default value for Repository Release|Snapshot Enabled in pom.xml and settings.xml files #9751Beta Was this translation helpful? Give feedback.
All reactions