v0.50.0 #6340
aqua-bot
announced in
Announcements
v0.50.0
#6340
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
🚀 What's new? 🚀
🚫 PURL Support for .trivyignore.yaml 📝
Trivy now supports ignoring vulnerabilities by PURL (Package URL) in the
.trivyignore.yaml
file, enabling more precise control over scan results.📝 Ignore by Rego enhancements 🛡️
You can now use Rego to filter out Licenses and Secrets findings. This is in addition to the existing support for filtering vulnerabilities and misconfiguration using Rego. https://aquasecurity.github.io/trivy/v0.50/docs/configuration/filtering/#by-rego
Thanks to @kristyko for the contribution!
🌺 Report Suppressed Vulnerabilities 👻
Trivy's new
--show-suppressed
flag reveals suppressed vulnerabilities due to .trivyignore, Rego policies, or VEX declarations, improving transparency and context in security reports.When the
--show-suppressed
flag is specified, it now displays suppressed vulnerabilities alongside the regular detected vulnerabilities as follows:🐘 Enhanced Gradle Support 🌿
Trivy has been updated to parse *.pom files from the Gradle cache directory, enhancing support for detecting licenses and the dependency tree in Java projects.
🦕 Custom Podman Host Support 🛃
Trivy now includes a
--podman-host
option for the image command, allowing users to specify a custom Podman host for image scanning.Thanks to @parvez0 for the contribution!
☕ Maven Invoker Plugin Dependency Marking 👿
Trivy now marks dependencies from
maven-invoker-plugin
integration tests in**/[src|target]/it/*/pom.xml
files as the development dependencies, enhancing Java project scans by allowing these dependencies to be included or skipped with the--include-dev-deps
flag.⎈ Rancher RKE2 Control Plane and Node components vulnerability scanning 💀
Trivy now supports the Rancher RKE2
control plane
andnode components
(apiserver, controller-manager, kubelet, kube-proxy and etc) vulnerability scanning.🍰Simplification of Misconfiguration codebase 🍄
We've integrated misconfiguration scanning better into Trivy by merging the "defsec" repository. As a result Trivy's architecture is simpler and better reflecting misconfiguration scanning as core scanner of Trivy. The checks are all defined within the trivy-policies repository. This should not have any implications on users, but might have for contributors/integrators.
🦆Improved support for Terraform Dynamic blocks 🧱
We've improved correctly evaluating dynamic blocks by not re-expanding them. This helps prevents false positives.
🪭Improved scanning support for Terraform Plan in JSON 🗃️
Scanning Terraform Plan files has been improved and now it's possible to scan both the Terraform Plan snapshots and their JSON representations.
Will generate and scan a terraform plan snapshot. We recommend saving the plan as a snapshot and scanning approach.
👷♂️ Notable Fixes 🛠️
Amazon Linux
version as EOL if*/system-release
file uses2023.xxx.xxx
format #6294runtime
scope #6207Beta Was this translation helpful? Give feedback.
All reactions