Skip to the content.

Trivy Scan [docker action]

Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers.

A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System.

Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn etc.).

The latest version available for this action is 40c22b7a. It was last updated on Thu Apr 21 2022.

Inputs

image

The name of the docker image to scan

token

A GitHub token to authenticate requests for the Trivy cache

output

Path to trivy output

ignore

Path to the .trivyignore file

Examples

As a step in pre-existing job.

This simple job example has the bare minimum required to run.

trivy-scan: name: Trivy Scan runs-on: ubuntu-latest steps: - uses: actions/checkout@master - uses: dogmatic69/actions@40c22b7a with: image: foobar

This example has all possible inputs, with dummy data.

trivy-scan: name: Trivy Scan runs-on: ubuntu-latest steps: - uses: actions/checkout@master - uses: dogmatic69/actions@40c22b7a with: image: foobar token: foobar output: foobar ignore: foobar