Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Alternatives To Trivy
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Trivy19,5465813 hours ago205November 06, 2023199apache-2.0Go
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
Authelia18,043214 hours ago64October 28, 2019102apache-2.0Go
The Single Sign-On Multi-Factor portal for web apps
Clair9,8153523a day ago139March 21, 202226apache-2.0Go
Vulnerability Static Analysis for Containers
14 hours ago24November 20, 2023196apache-2.0TypeScript
Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more.
Kube Hunter4,482221 days ago18May 12, 202280apache-2.0Python
Hunt for security weaknesses in Kubernetes clusters
Contour3,5413913 hours ago175October 30, 2023357apache-2.0Go
Contour is a Kubernetes ingress controller using Envoy proxy.
2 months ago35March 12, 202314apache-2.0Go
📦 Make security testing of K8s, Docker, and Containerd easier.
Django Defectdojo3,155
11 hours ago419bsd-3-clauseHTML
ASPM, DevSecOps, Vulnerability Management. All on one platform.
Dockle2,534212 days ago75July 09, 202330apache-2.0Go
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Starboard1,3318a month ago116October 23, 202356apache-2.0Go
Moved to
Alternatives To Trivy
Select To Compare

Alternative Project Comparisons

Trivy (pronunciation) is a comprehensive and versatile security scanner. Trivy has scanners that look for security issues, and targets where it can find those issues.

Targets (what Trivy can scan):

  • Container Image
  • Filesystem
  • Git Repository (remote)
  • Virtual Machine Image
  • Kubernetes
  • AWS

Scanners (what Trivy can find there):

  • OS packages and software dependencies in use (SBOM)
  • Known vulnerabilities (CVEs)
  • IaC issues and misconfigurations
  • Sensitive information and secrets
  • Software licenses

Trivy supports most popular programming languages, operating systems, and platforms. For a complete list, see the Scanning Coverage page.

To learn more, go to the Trivy homepage for feature highlights, or to the Documentation site for detailed information.

Quick Start

Get Trivy

Trivy is available in most common distribution channels. The full list of installation options is available in the Installation page. Here are a few popular examples:

Trivy is integrated with many popular platforms and applications. The complete list of integrations is available in the Ecosystem page. Here are a few popular examples:

Canary builds

There are canary builds (Docker Hub, GitHub, ECR images and binaries) as generated every push to main branch.

Please be aware: canary builds might have critical bugs, it's not recommended for use in production.

General usage

trivy <target> [--scanners <scanner1,scanner2>] <subject>


trivy image python:3.4-alpine

trivy fs --scanners vuln,secret,misconfig myproject/

trivy k8s --report summary cluster

k8s summary


How to pronounce the name "Trivy"?

tri is pronounced like trigger, vy is pronounced like envy.

Want more? Check out Aqua

If you liked Trivy, you will love Aqua which builds on top of Trivy to provide even more enhanced capabilities for a complete security management offering.
You can find a high level comparison table specific to Trivy users here.
In addition check out the website for more information about our products and services. If you'd like to contact Aqua or request a demo, please use this form:


Trivy is an Aqua Security open source project.
Learn about our open source work and portfolio here.
Contact us about any matter by opening a GitHub Discussion here Join our Slack community to stay up to date with community efforts.

Please ensure to abide by our Code of Conduct during all interactions.

Popular Kubernetes Projects
Popular Vulnerabilities Projects
Popular Virtualization Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Security Tools
Infrastructure As Code
Vulnerability Scanners
Vulnerability Detection