You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/docs/scanner/vulnerability.md
+43-35Lines changed: 43 additions & 35 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -148,28 +148,17 @@ If you have software that is not managed by a package manager, Trivy can still d
148
148
-[Rust Binaries with embedded information](../coverage/language/rust.md#binaries)
149
149
-[SBOM embedded in container images](../supply-chain/sbom.md#sbom-detection-inside-targets)
150
150
151
-
## Kubernetes
152
-
153
-
Trivy can detect vulnerabilities in Kubernetes clusters and components by scanning a Kubernetes Cluster, or a KBOM (Kubernetes bill of Material). To learn more, see the [documentation for Kubernetes scanning](../target/kubernetes.md).
| Kubernetes |[Kubernetes Official CVE feed][k8s-cve][^1]|
160
-
161
-
[^1]: Some manual triage and correction has been made.
162
-
163
-
## Databases
164
-
The information from the above sources is collected and stored in databases that Trivy uses for vulnerability scanning. Trivy automatically fetches, maintains, and caches the relevant databases when performing a vulnerability scan
165
-
For more information about Trivy's Databases mechanism and configurations, refer to the [Databases document](../configuration/db.md).
166
-
167
151
## Detection Behavior
168
152
Trivy prioritizes precision in vulnerability detection, aiming to minimize false positives while potentially accepting some false negatives.
169
153
This approach is particularly relevant in two key areas:
170
154
171
-
- Handling Software Installed via OS Packages
172
-
- Handling Packages with Unspecified Versions
155
+
-[Handling Software Installed via OS Packages](#handling-software-installed-via-os-packages)
156
+
-[Handling Packages with Unspecified Versions](#handling-packages-with-unspecified-versions)
157
+
158
+
Trivy can also detect only specific packages:
159
+
160
+
-[Subset of Package Types](#enabling-a-subset-of-package-types)
-`precise`: This mode prioritizes reducing false positives. It results in less noisy vulnerability reports but may miss some potential vulnerabilities.
218
+
-`comprehensive`: This mode aims to detect more vulnerabilities, potentially including some that might be false positives.
219
+
It provides broader coverage but may increase the noise in the results.
220
+
221
+
The default value is `precise`. Also refer to the [detection behavior](#detection-behavior) section for more information.
222
+
223
+
Regardless of the chosen mode, user review of detected vulnerabilities is crucial:
Trivy supports filtering vulnerabilities based on the relationship of packages within a project.
293
301
This is achieved through the `--pkg-relationships` flag.
294
302
This feature allows you to focus on vulnerabilities in specific types of dependencies, such as only those in direct dependencies.
@@ -322,25 +330,25 @@ By default, all relationships are included in the scan.
322
330
!!! warning
323
331
As it may not provide a complete package list, `--pkg-relationships` cannot be used with `--dependency-tree`, `--vex` or SBOM generation.
324
332
325
-
### Detection Priority
333
+
## Kubernetes
326
334
327
-
Trivy provides a `--detection-priority` flag to control the balance between false positives and false negatives in vulnerability detection.
328
-
This concept is similar to the relationship between [precision and recall][precision-recall] in machine learning evaluation.
335
+
Trivy can detect vulnerabilities in Kubernetes clusters and components by scanning a Kubernetes Cluster, or a KBOM (Kubernetes bill of Material). To learn more, see the [documentation for Kubernetes scanning](../target/kubernetes.md).
- `precise`: This mode prioritizes reducing false positives. It results in less noisy vulnerability reports but may miss some potential vulnerabilities.
335
-
- `comprehensive`: This mode aims to detect more vulnerabilities, potentially including some that might be false positives.
336
-
It provides broader coverage but may increase the noise in the results.
| Kubernetes | [Kubernetes Official CVE feed][k8s-cve][^1] |
337
342
338
-
The default value is `precise`. Also refer to the [detection behavior](#detection-behavior) section for more information.
343
+
[^1]: Some manual triage and correction has been made.
339
344
340
-
Regardless of the chosen mode, user review of detected vulnerabilities is crucial:
345
+
## Databases
346
+
The information from the above sources is collected and stored in databases that Trivy uses for vulnerability scanning. Trivy automatically fetches, maintains, and caches the relevant databases when performing a vulnerability scan
347
+
For more information about Trivy's Databases mechanism and configurations, refer to the [Databases document](../configuration/db.md).
0 commit comments