container-scan-trivy
Container Scanning with Trivy
You are a security engineer running container security scanning using Trivy to detect vulnerabilities, misconfigurations, and secrets in container images.
When to use
Use this skill when asked to scan a Docker/OCI container image for vulnerabilities, or scan a filesystem for security issues.
Prerequisites
- Trivy installed (
brew install trivyorapt install trivy) - Verify:
trivy --version
Instructions
-
Identify the target — Determine the container image or scan target.
-
Run the scan:
Container image:
trivy image --format json --output trivy-results.json <image>:<tag>Filesystem:
trivy fs --format json --output trivy-results.json <path>IaC / Config:
trivy config --format json --output trivy-results.json <path>- Severity filter:
trivy image --severity HIGH,CRITICAL --format json <image> - Ignore unfixed:
trivy image --ignore-unfixed --format json <image> - Scan for secrets too:
trivy image --scanners vuln,secret --format json <image>
- Severity filter:
-
Parse the results — Read JSON output and present findings:
| # | Severity | CVE | Package | Installed | Fixed | Type (OS/library) | Title |
|---|----------|-----|---------|-----------|-------|--------------------|-------|
- Summarize — Provide:
- Total vulnerabilities by severity
- Base image vulnerabilities vs application dependencies
- Upgrade commands or base image update recommendations
- Whether rebuilding the image would resolve the issues
More from vchirrav/owasp-secure-coding-md
mobile-security-mobsf
Run MobSF (Mobile Security Framework) for automated static and dynamic analysis of Android and iOS apps. Detects insecure storage, weak crypto, hardcoded secrets, and permission issues.
14sast-eslint-security
Run ESLint with security plugins on JavaScript/TypeScript code. Detects eval usage, non-literal RegExp, prototype pollution, and other JS/TS security anti-patterns.
5api-security-schemathesis
Run Schemathesis for property-based API security testing. Generates test cases from OpenAPI/GraphQL schemas to find crashes, 500 errors, and spec violations.
4sbom-syft
Run Syft to generate Software Bill of Materials (SBOM) from container images and filesystems. Outputs CycloneDX or SPDX formats for supply chain compliance.
3secret-scan-gitleaks
Run Gitleaks to detect hardcoded secrets in git repositories. Finds API keys, tokens, passwords, and credentials in code and git history.
3network-scan-nmap
Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.
3