v0.31.0 #2716
aqua-bot
announced in
Announcements
v0.31.0
#2716
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
🚀 What's new? 🚀
☁️ AWS cloud scanning 🩻
You can now scan live AWS accounts for misconfigurations with the
trivy aws
command.All the misconfiguration rules built into Trivy for IaC scanning are the same rules being used to scan AWS. This means the rules are consistent across, as a bonus, can be used to find the causes of AWS issues when infrastructure is defined with Terraform or CloudFormation. In addition to the existing rules we've added support for CIS AWS 1.2, and 1.4 is coming up next.
Authentication is done using all of the same mechanisms supported by the
aws-cli
, so you can likely get up and running simply by running the newtrivy aws
command.See here for more detail.
🚢 SBOM generation without vulnerability scanning ⛓️
--format cyclonedx
,--format spdx
and--format json
disables security checks by default so that you can just generate SBOM.📝 Support for vulnerability attestations
You can create a cosign vulnerability scan record attestation with
--format cosign-vuln
.See here for more details.
🌀 Scan SBOM attestation for vulnerabilities 🧛
To create an SBOM attestation using cosign:
Now you can scan this SBOM attestation for vulnerabilities.
Compared to the previously supported SBOM scanning feature, this way helps you verify the authenticity and integrity of the SBOM that you are about to scan.
See here for more details.
🔐 Detect removed secrets in the intermediate layer 🙈
Previously Trivy could scan a container image for exposed secrets only in the resulting "merged" filesystem of the container. If a secret was added to a container and then removed in an upper layer, this would be missed in the merged filesystem. Now Trivy can find those exposed secrets in all intermediary layers.
💉 Provide external values to templated configuratoins 📜
When scanning Helm charts or Terraform plans, it's common to parameterize some values and provide them only at deployment time. This means scanning an incomplete configuration which might miss some issues. Now you can provide this missing information to Terraform and Helm scanning.
See here for more details.
🦀 Scan Rust binaries 🦀
If a binary is built by cargo-auditable, Trivy will extract dependencies of the binary and scan it for vulnerabilities.
Thanks to @tofay
🏷️ Support git branch, commit and tag in repository scanning 🌮
Thanks to @ShubhamPalriwala
Provide a kubeconfig file to Kubernetes scanning
You can now override the default kubeconfig file when scanning Kubernetes cluster
Thanks to @mgsh
Changelog
This discussion was created from the release v0.31.0.
Beta Was this translation helpful? Give feedback.
All reactions