[cli] a way to add trivy client arguments to vulnerability scans (global or per K8s workload) #340
rurus9
started this conversation in
Development
Replies: 1 comment 1 reply
-
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
As I wrote in #337 a way to add specific trivy client arguments will be very useful for us.
With trivy client I can add do not show unfixed (https://github.com/aquasecurity/trivy#ignore-unfixed-vulnerabilities):
--ignore-unfixed # display only fixed vulnerabilities (default: false) [$TRIVY_IGNORE_UNFIXED]another thing important to me is to avoid some false positive checks with Ruby (https://github.com/aquasecurity/trivy#skip-traversal-of-the-specific-files):
--skip-files "/Gemfile.lock,/app/Pipfile.lock"or ignore specific vulnerabilities (https://github.com/aquasecurity/trivy#ignore-the-specified-vulnerabilities):
--ignorefile value specify .trivyignore file (default: ".trivyignore") [$TRIVY_IGNOREFILE]@danielpacak wrote an answer
Ideally there should be options to set it to specific K8s workload (eg I know that I have false positive with my fluentd deployment, so I can ingore specific CVE only for this deployment).
The ability to set it globally by starboard ConfigMap also comes into play.
Beta Was this translation helpful? Give feedback.
All reactions