v0.38.0 #3719
aqua-bot
announced in
Announcements
v0.38.0
#3719
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
🚀 What's new? 🚀
🐳 Complete Docker CIS Benchmark 📝
In the previous release, we have introduced Docker CIS Benchmark scanning to Trivy (
trivy image --compliance docker-cis
). With this release, Trivy now completes the report by detecting vulnerabilities of installed packages (section 4.4) and secrets in the Dockerfile (section 4.10).Here is the detail.
⎈ Kubernetes resources for deprecated and removal APIs 💀
When Trivy scans Kubernetes resources it can now alert when the resource is using a deprecated (or about to be) API, and will also suggest the recommended newer version. now can easily check resources against specific k8s version
🐭 Dependency tree and license support for Go 🌲
When scanning a Go project, Trivy now identifies dependency relationships and licenses. This works by finding package sources in
$GOPATH
so in order to work, make sure modules were downloaded to local cache beforehand (go mod download
/go mod tidy
).See here for detail.
📃 Dependency tree for Poetry (Python) 🌲
When scanning a Poetry project, Trivy now identifies dependency relationships and shows the tree with
--dependency-tree
. It also requirespyproject.toml
alongsidepoetry.lock
to identify dependency relationships.See here for detail.
💎 Dependency tree for Bundler (Ruby) 🌲
Trivy now shows a dependency origin tree on Gemfile.lock. The following example describes the vulnerable
actionpack
is introduced byactioncable
, which is a direct dependency of the Ruby project.🧭 Command completion
See the documentation for detail.
Thanks, @didiermichel and @congbang-le
🕐 Fail on EOSL OS 🚫
OS vendors might stop providing security advisories for operating systems after the end of support period (EOL). Thus when scanning such EOL images, newly disclosed vulnerabilities may not be detected and the scan would seemingly "succeed". The new
--exit-on-eol
flag enables you to "fail" the scan in such cases, so that you're at least aware of the situation.It fails scanning on EOL OSes with the specified exit code.
Thanks, @blueskyson
🫖 Configure the Java DB repository
In the previous release we introduced new Java scanning architecture that does not rely on external API calls during scan and thus is much more reliable. The new Java scanner uses a dedicated "Trivy Java DB" that is added to the regular "Trivy DB" for Java scanning. This release makes is possible override the default Java DB location using a new flag:
--java-db-repository
.Thanks, @nobbs
🎨 Input schemas for rego checks
When authoring rego checks, It's now possible to supply validate the "input" to the policy with a json schema. This is helpful to avoid typo mistakes which might lead to inaccurate detections. You can choose from the builtin schemas for Cloud, Kubernetes, and Dockerfile inputs, or provide your own json schema to validate against.
Read more here.
This discussion was created from the release v0.38.0.
Beta Was this translation helpful? Give feedback.
All reactions