v0.59.0 #8312
aqua-bot
announced in
Announcements
v0.59.0
#8312
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
📑 Table of Contents
🚀 What's new? 🚀
🪞Registry mirrors support 🪩
Trivy now supports mirrors for registries.
To set them up, you need to configure the host and mirrors in the Trivy config file
For more information, see https://trivy.dev/latest/docs/configuration/others/#mirror-registries.
🔄 Manual OS Distribution Override 🎭
Trivy now supports manually specifying the OS distribution for vulnerability scanning through the new
--distro
flag. This feature is particularly useful in several scenarios:/etc/os-release
is removed)Usage:
When the
--distro
flag is provided, it will override any automatically detected OS information. The flag expects the format<family>/<version>
and supports major Linux distributions, including Alpine, Debian, and Red Hat.🎯 Improved Cache Efficiency for Git Repositories 💾
Trivy now uses Git commit hashes as cache keys when scanning clean Git repositories, resulting in more efficient caching and subsequent faster scans. This improvement helps eliminate unnecessary cache invalidation and repeated scans.
Key improvements:
Usage:
✨ Improve artifact selections from Kubernetes cluster 🕋
Enhanced artifact handling and filtering based on
--include-namespaces/--exclude-namespaces
and--include-kinds
/--exclude-kinds
flags. Scanning a Kubernetes cluster now requires onlyRole
for the relevant namespaces instead ofClusterRole
.This command selects artifacts only from
limitedns
namespace for the next role🔗 Support for npm Peer Dependencies 🤝
Trivy now treats peer dependencies as normal dependencies for more accurate vulnerability detection and dependency tree visualization. This change aligns with modern npm behavior (v7+) where peer dependencies are installed and displayed in the dependency tree like regular dependencies.
This improvement helps:
Usage:
# Scan a Node.js project with peer dependencies trivy repo /path/to/nodejs/project
⚓️ Support for inline ignores for Dockerfiles and Helm ⎈
Trivy now supports inline ignores for Dockerfile and Helm misconfiguration scanning.
Dockerfile:
Helm:
🐍 Support for the Python uv package manager 📦
Trivy now supports scanning the
uv.lock
lock file of the uv package manger to extract dependencies and find vulnerabilities. By default, Trivy doesn't report development dependencies. Use the--include-dev-deps
flag to include them.🎶 Support for Poetry dev dependencies 🎵 🧑💻
Trivy now extracts dev dependencies from the
poetry.lock
lock file. By default, Trivy doesn't report development dependencies. Use the--include-dev-deps
flag to include them.🐳 Added option to prevent scanning of oversized container images 🚫
Use the
--max-image-size
flag to avoid scanning images that exceed a specified size. The size is specified in a human-readable format (e.g., 100MB, 10GB). Trivy uses decimal (SI) prefixes (based on 1000) for size.An error is returned in the following cases:
👷♂️ Notable Fixes 🛠️
--generate-default-config
contains removed and deprecated flags #8043hasExtractedLicensingInfos
for licenses not in the SPDX license list #7721Beta Was this translation helpful? Give feedback.
All reactions