Replies: 3 comments
-
Would be cool to have that "long-term monitoring of existing images". But instead of re-running the full trivy-process it would be cool, if it do not pull the image on and on. Just scan it for packages (all package managers) once, then store the list of installed packages in a "central trivy server" (lets call it "trivy report service") and have a cron every day that simply pulls latest vulnerability data and re-evaluates that "package list", without pulling all images every day. An An Only images tagged with "latest" should be pulled every time. Optional a user should be able to provide a "force-image-pull.list" to force pulling images where you expect that they are not immutable (are re-builded). |
Beta Was this translation helpful? Give feedback.
-
Also endpoints for "Docker Hub Webhook", "Github Webhooks", "Travis-CI Webhooks", etc. would be cool, to allow those service to trigger a vulnerability scan / to force a re-scan/re-pull of a changed image. |
Beta Was this translation helpful? Give feedback.
-
other formats to export: #140 |
Beta Was this translation helpful? Give feedback.
-
With trivy docker installation option, do we have efficient way of scanning all images in a registry at frequent intervals. Any suggestions on how to achieve this will be much appreciated.
Beta Was this translation helpful? Give feedback.
All reactions