GStars
    aquasecurity

    aquasecurity/trivy

    Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

    security
    devops
    infrastructure
    kubernetes
    containers
    devsecops
    docker
    go
    golang
    hacktoberfest
    iac
    infrastructure-as-code
    misconfiguration
    security-tools
    vulnerability
    vulnerability-detection
    vulnerability-scanners
    Go
    Apache-2.0
    32.3K stars
    3.0K forks
    32.3K watching
    Updated 2/27/2026
    View on GitHub
    Backblaze Advertisement

    Loading star history...

    Health Score

    75

    Weekly Growth

    +210

    +0.7% this week

    Contributors

    1

    Total contributors

    Open Issues

    219

    Generated Insights

    About trivy

    Trivy (pronunciation) is a comprehensive and versatile security scanner. Trivy has scanners that look for security issues, and targets where it can find those issues.

    Targets (what Trivy can scan):

    • Container Image
    • Filesystem
    • Git Repository (remote)
    • Virtual Machine Image
    • Kubernetes

    Scanners (what Trivy can find there):

    • OS packages and software dependencies in use (SBOM)
    • Known vulnerabilities (CVEs)
    • IaC issues and misconfigurations
    • Sensitive information and secrets
    • Software licenses

    Trivy supports most popular programming languages, operating systems, and platforms. For a complete list, see the Scanning Coverage page.

    To learn more, go to the Trivy homepage for feature highlights, or to the Documentation site for detailed information.

    Quick Start

    Get Trivy

    Trivy is available in most common distribution channels. The full list of installation options is available in the Installation page. Here are a few popular examples:

    Trivy is integrated with many popular platforms and applications. The complete list of integrations is available in the Ecosystem page. Here are a few popular examples:

    Canary builds

    There are canary builds (Docker Hub, GitHub, ECR images and binaries) as generated every push to main branch.

    Please be aware: canary builds might have critical bugs, it's not recommended for use in production.

    General usage

    trivy <target> [--scanners <scanner1,scanner2>] <subject>
    

    Examples:

    trivy image python:3.4-alpine
    
    Result

    https://user-images.githubusercontent.com/1161307/171013513-95f18734-233d-45d3-aaf5-d6aec687db0e.mov

    trivy fs --scanners vuln,secret,misconfig myproject/
    
    Result

    https://user-images.githubusercontent.com/1161307/171013917-b1f37810-f434-465c-b01a-22de036bd9b3.mov

    trivy k8s --report summary cluster
    
    Result

    k8s summary

    FAQ

    How to pronounce the name "Trivy"?

    tri is pronounced like trigger, vy is pronounced like envy.

    Want more? Check out Aqua

    If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
    You can find a high level comparison table specific to Trivy users here. In addition check out the https://aquasec.com website for more information about our products and services. If you'd like to contact Aqua or request a demo, please use this form: https://www.aquasec.com/demo

    Community

    Trivy is an Aqua Security open source project.
    Learn about our open source work and portfolio here.
    Contact us about any matter by opening a GitHub Discussion here

    Please ensure to abide by our Code of Conduct during all interactions.

    Discover Repositories

    Search across tracked repositories by name or description