Skip to the content.

Trivy Scan [docker action]

Trivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers.

A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System.

Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn etc.).

The latest version available for this action is 7728686b. It was last updated on Fri Feb 27 2026.

Inputs

image

The name of the docker image to scan

token

A GitHub token to authenticate requests for the Trivy cache

output

Path to trivy output

ignore

Path to the .trivyignore file

ignore-unfixed

Skip vulnerabilities with no fix available

Examples

As a step in pre-existing job.

This simple job example has the bare minimum required to run.

trivy-scan: name: Trivy Scan runs-on: ubuntu-latest steps: - uses: actions/checkout@master - uses: dogmatic69/actions@7728686b with: image: foobar

This example has all possible inputs, with dummy data.

trivy-scan: name: Trivy Scan runs-on: ubuntu-latest steps: - uses: actions/checkout@master - uses: dogmatic69/actions@7728686b with: image: foobar token: foobar output: foobar ignore: foobar ignore-unfixed: foobar