Key features
- Container image scanning — OS and language dependency CVE detection across Alpine, Debian, Ubuntu, and RHEL base images
- Kubernetes scanning — cluster configuration, CIS Benchmark controls, and RBAC misconfiguration detection
- IaC scanning — Terraform, CloudFormation, Kubernetes manifests, and Dockerfile security checks
- SBOM generation — CycloneDX and SPDX format software bills of materials for supply chain compliance
- Language SCA — Go, Python, Node.js, Java, Ruby, PHP, Rust dependency vulnerability detection
- Secret detection — embedded secrets and API keys in container images and filesystems
- CI/CD integration — GitHub Actions, GitLab CI, Jenkins, and CircleCI Trivy actions available
Best for
- APAC platform engineering teams wanting a single open-source scanner covering container images, Kubernetes, and IaC in CI/CD pipelines
- DevSecOps teams shifting security left — scanning container images and IaC before deployment in APAC release pipelines
- APAC organisations required to produce SBOMs for software supply chain compliance or government procurement
- Engineering teams wanting CNCF-adopted container scanning that integrates with Harbor registry scanning and Kubernetes admission controllers
Limitations to know
- ! Trivy false positive rate — actively maintained databases but APAC teams should tune severity thresholds and add .trivyignore for accepted risks to avoid alert fatigue
- ! Trivy does not replace a full DAST or SAST tool — it scans known CVEs and misconfigurations but does not perform dynamic application testing or code-level static analysis
- ! Trivy vulnerability database requires network access for updates — APAC air-gapped environments must configure offline database mirroring
- ! Kubernetes scanning requires cluster access — Trivy k8s mode needs appropriate RBAC permissions and is not suitable for read-only compliance scanning without permission grants
About Trivy
Trivy is an open-source, all-in-one security scanner maintained by Aqua Security and adopted as a CNCF project that provides APAC DevSecOps and platform engineering teams with vulnerability scanning for container images, OS packages, language-specific dependencies, Kubernetes cluster configurations, Infrastructure-as-Code files (Terraform, CloudFormation, Helm), and SBOM (Software Bill of Materials) generation — delivering comprehensive supply chain security visibility from a single tool across the APAC software delivery pipeline.
Trivy's vulnerability detection covers OS package vulnerabilities (Alpine, Debian, Ubuntu, RHEL, Amazon Linux, and other distributions used in APAC container base images) and language-specific dependency vulnerabilities (Go modules, Python pip/poetry, Node.js npm/yarn, Java Maven/Gradle, Ruby Gems, PHP Composer, Rust Cargo) — matching installed packages and dependencies against multiple CVE databases including NVD, GitHub Advisory Database, and distro-specific security advisories. APAC engineering teams running mixed-language microservices scan all service images through a unified Trivy command and get a consistent vulnerability report across languages.
Trivy's Kubernetes integration — which scans running cluster resources (Pods, Deployments, Namespaces) and their associated container images, checks cluster configurations against CIS Kubernetes Benchmark controls, and identifies RBAC misconfigurations — enables APAC platform engineering teams to assess the security posture of production Kubernetes clusters without extracting image lists and scanning them separately. A single `trivy k8s --report=summary cluster` command produces a cluster-wide security assessment.
Trivy's SBOM generation — which produces CycloneDX and SPDX format Software Bills of Materials from container images and filesystems — enables APAC organisations to meet software supply chain transparency requirements from APAC government procurement agencies and enterprise customers that require SBOM documentation for critical infrastructure software. Trivy generates SBOMs that list all packages, dependencies, and their licence information in machine-readable format.
Trivy's IaC scanning — which checks Terraform plans, CloudFormation templates, Kubernetes manifests, and Dockerfile configurations against security best practice rules — enables APAC platform engineering teams to shift vulnerability and misconfiguration detection left into the CI/CD pipeline, catching security issues before infrastructure is provisioned or container images are built.
Beyond this tool
Where this category meets practice depth.
A tool only matters in context. Browse the service pillars that operationalise it, the industries where it ships, and the Asian markets where AIMenta runs adoption programs.
Other service pillars
By industry