Demo repository showcasing some of the possibilities of Aqua Trivy.
Let's look at an example of scanning an image using Trivy:
> trivy image python:3.4-alpine
The output:
2023-05-06T15:29:29.058Z INFO Need to update DB
2023-05-06T15:29:29.058Z INFO DB Repository: ghcr.io/aquasecurity/trivy-db
2023-05-06T15:29:29.058Z INFO Downloading DB...
36.61 MiB / 36.61 MiB [----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------] 100.00% 9.89 MiB p/s 3.9s
2023-05-06T15:29:34.194Z INFO Vulnerability scanning is enabled
2023-05-06T15:29:34.194Z INFO Secret scanning is enabled
2023-05-06T15:29:34.194Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2023-05-06T15:29:34.194Z INFO Please see also https://aquasecurity.github.io/trivy/v0.41/docs/secret/scanning/#recommendation for faster secret detection
2023-05-06T15:29:39.449Z INFO Detected OS: alpine
2023-05-06T15:29:39.450Z INFO Detecting Alpine vulnerabilities...
2023-05-06T15:29:39.450Z INFO Number of language-specific files: 1
2023-05-06T15:29:39.450Z INFO Detecting python-pkg vulnerabilities...
2023-05-06T15:29:39.452Z WARN This OS version is no longer supported by the distribution: alpine 3.9.2
2023-05-06T15:29:39.452Z WARN The vulnerability detection may be insufficient because security updates are not provided
python:3.4-alpine (alpine 3.9.2)
Total: 37 (UNKNOWN: 0, LOW: 4, MEDIUM: 16, HIGH: 13, CRITICAL: 4)
ââââââââââââââââŹâââââââââââââââââŹâââââââââââŹââââââââââââââââââââŹââââââââââââââââŹâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â Library â Vulnerability â Severity â Installed Version â Fixed Version â Title â
ââââââââââââââââŒâââââââââââââââââŒâââââââââââŒââââââââââââââââââââŒââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â expat â CVE-2018-20843 â HIGH â 2.2.6-r0 â 2.2.7-r0 â expat: large number of colons in input makes parser consume â
â â â â â â high amount... â
â â â â â â https://avd.aquasec.com/nvd/cve-2018-20843 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-15903 â â â 2.2.7-r1 â expat: heap-based buffer over-read via crafted XML input â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-15903 â
ââââââââââââââââŒâââââââââââââââââŒâââââââââââŒââââââââââââââââââââŒââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â libbz2 â CVE-2019-12900 â CRITICAL â 1.0.6-r6 â 1.0.6-r7 â bzip2: out-of-bounds write in function BZ2_decompress â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-12900 â
ââââââââââââââââŒâââââââââââââââââŒâââââââââââŒââââââââââââââââââââŒââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â libcrypto1.1 â CVE-2019-1543 â HIGH â 1.1.1a-r1 â 1.1.1b-r1 â openssl: ChaCha20-Poly1305 with long nonces â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1543 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2020-1967 â â â 1.1.1g-r0 â openssl: Segmentation fault in SSL_check_chain causes denial â
â â â â â â of service â
â â â â â â https://avd.aquasec.com/nvd/cve-2020-1967 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-23840 â â â 1.1.1j-r0 â openssl: integer overflow in CipherUpdate â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-23840 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-3450 â â â 1.1.1k-r0 â openssl: CA certificate check bypass with â
â â â â â â X509_V_FLAG_X509_STRICT â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-3450 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-1547 â MEDIUM â â 1.1.1d-r0 â openssl: side-channel weak encryption vulnerability â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1547 â
â âââââââââââââââââ†â â ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-1549 â â â â openssl: information disclosure in fork() â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1549 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-1551 â â â 1.1.1d-r2 â openssl: Integer overflow in RSAZ modular exponentiation on â
â â â â â â x86_64 â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1551 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2020-1971 â â â 1.1.1i-r0 â openssl: EDIPARTYNAME NULL pointer de-reference â
â â â â â â https://avd.aquasec.com/nvd/cve-2020-1971 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-23841 â â â 1.1.1j-r0 â openssl: NULL pointer dereference in â
â â â â â â X509_issuer_and_serial_hash() â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-23841 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-3449 â â â 1.1.1k-r0 â openssl: NULL pointer dereference in signature_algorithms â
â â â â â â processing â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-3449 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-1563 â LOW â â 1.1.1d-r0 â openssl: information disclosure in PKCS7_dataDecode and â
â â â â â â CMS_decrypt_set1_pkey â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1563 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-23839 â â â 1.1.1j-r0 â openssl: incorrect SSLv2 rollback protection â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-23839 â
ââââââââââââââââŒâââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â libssl1.1 â CVE-2019-1543 â HIGH â â 1.1.1b-r1 â openssl: ChaCha20-Poly1305 with long nonces â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1543 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2020-1967 â â â 1.1.1g-r0 â openssl: Segmentation fault in SSL_check_chain causes denial â
â â â â â â of service â
â â â â â â https://avd.aquasec.com/nvd/cve-2020-1967 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-23840 â â â 1.1.1j-r0 â openssl: integer overflow in CipherUpdate â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-23840 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-3450 â â â 1.1.1k-r0 â openssl: CA certificate check bypass with â
â â â â â â X509_V_FLAG_X509_STRICT â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-3450 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-1547 â MEDIUM â â 1.1.1d-r0 â openssl: side-channel weak encryption vulnerability â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1547 â
â âââââââââââââââââ†â â ââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-1549 â â â â openssl: information disclosure in fork() â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1549 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-1551 â â â 1.1.1d-r2 â openssl: Integer overflow in RSAZ modular exponentiation on â
â â â â â â x86_64 â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1551 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2020-1971 â â â 1.1.1i-r0 â openssl: EDIPARTYNAME NULL pointer de-reference â
â â â â â â https://avd.aquasec.com/nvd/cve-2020-1971 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-23841 â â â 1.1.1j-r0 â openssl: NULL pointer dereference in â
â â â â â â X509_issuer_and_serial_hash() â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-23841 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-3449 â â â 1.1.1k-r0 â openssl: NULL pointer dereference in signature_algorithms â
â â â â â â processing â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-3449 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-1563 â LOW â â 1.1.1d-r0 â openssl: information disclosure in PKCS7_dataDecode and â
â â â â â â CMS_decrypt_set1_pkey â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-1563 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-23839 â â â 1.1.1j-r0 â openssl: incorrect SSLv2 rollback protection â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-23839 â
ââââââââââââââââŒâââââââââââââââââŒâââââââââââŒââââââââââââââââââââŒââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â musl â CVE-2019-14697 â CRITICAL â 1.1.20-r4 â 1.1.20-r5 â musl libc through 1.1.23 has an x87 floating-point stack â
â â â â â â adjustment im ...... â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-14697 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2020-28928 â MEDIUM â â 1.1.20-r6 â In musl libc through 1.2.1, wcsnrtombs mishandles particular â
â â â â â â combinati ... â
â â â â â â https://avd.aquasec.com/nvd/cve-2020-28928 â
ââââââââââââââââŒâââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â musl-utils â CVE-2019-14697 â CRITICAL â â 1.1.20-r5 â musl libc through 1.1.23 has an x87 floating-point stack â
â â â â â â adjustment im ...... â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-14697 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2020-28928 â MEDIUM â â 1.1.20-r6 â In musl libc through 1.2.1, wcsnrtombs mishandles particular â
â â â â â â combinati ... â
â â â â â â https://avd.aquasec.com/nvd/cve-2020-28928 â
ââââââââââââââââŒâââââââââââââââââŒâââââââââââŒââââââââââââââââââââŒââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â sqlite-libs â CVE-2019-8457 â CRITICAL â 3.26.0-r3 â 3.28.0-r0 â sqlite: heap out-of-bound read in function rtreenode() â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-8457 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-19244 â HIGH â â 3.28.0-r2 â sqlite: allows a crash if a sub-select uses both DISTINCT â
â â â â â â and window... â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-19244 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-5018 â â â 3.28.0-r0 â sqlite: Use-after-free in window function leading to remote â
â â â â â â code execution â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-5018 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2020-11655 â â â 3.28.0-r3 â sqlite: malformed window-function query leads to DoS â
â â â â â â https://avd.aquasec.com/nvd/cve-2020-11655 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-16168 â MEDIUM â â 3.28.0-r1 â sqlite: Division by zero in whereLoopAddBtreeIndex in â
â â â â â â sqlite3.c â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-16168 â
â âââââââââââââââââ†â âââââââââââââââââŒâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2019-19242 â â â 3.28.0-r2 â sqlite: SQL injection in sqlite3ExprCodeTarget in expr.c â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-19242 â
ââââââââââââââââŽâââââââââââââââââŽâââââââââââŽââââââââââââââââââââŽââââââââââââââââŽâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
2023-05-06T15:29:39.463Z INFO Table result includes only package filenames. Use '--format json' option to get the full path to the package file.
Python (python-pkg)
Total: 4 (UNKNOWN: 0, LOW: 0, MEDIUM: 2, HIGH: 2, CRITICAL: 0)
âââââââââââââââââââââââââŹâââââââââââââââââŹâââââââââââŹââââââââââââââââââââŹââââââââââââââââŹââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
â Library â Vulnerability â Severity â Installed Version â Fixed Version â Title â
âââââââââââââââââââââââââŒâââââââââââââââââŒâââââââââââŒââââââââââââââââââââŒââââââââââââââââŒââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â pip (METADATA) â CVE-2019-20916 â HIGH â 19.0.3 â 19.2 â python-pip: directory traversal in _download_http_url() â
â â â â â â function in src/pip/_internal/download.py â
â â â â â â https://avd.aquasec.com/nvd/cve-2019-20916 â
â ââââââââââââââââââŒââââââââââ†âââââââââââââââââŒââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â â CVE-2021-3572 â MEDIUM â â 21.1 â python-pip: Incorrect handling of unicode separators in git â
â â â â â â references â
â â â â â â https://avd.aquasec.com/nvd/cve-2021-3572 â
âââââââââââââââââââââââââŒââââââââââââââââ†âââââââââââââââââââââŒââââââââââââââââŒââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â setuptools (METADATA) â CVE-2022-40897 â â 40.8.0 â 65.5.1 â Regular Expression Denial of Service (ReDoS) in â
â â â â â â package_index.py â
â â â â â â https://avd.aquasec.com/nvd/cve-2022-40897 â
âââââââââââââââââââââââââŒâââââââââââââââââŒâââââââââââŒââââââââââââââââââââŒââââââââââââââââŒââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ€
â wheel (METADATA) â CVE-2022-40898 â HIGH â 0.33.1 â 0.38.1 â remote attackers can cause denial of service via attacker â
â â â â â â controlled input... â
â â â â â â https://avd.aquasec.com/nvd/cve-2022-40898 â
âââââââââââââââââââââââââŽâââââââââââââââââŽâââââââââââŽââââââââââââââââââââŽââââââââââââââââŽââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ
You can scan a Dockerfile by running the Trivy scan on the Dockerfile, e.g., scanning-targets/Dockerfile.
trivy config scanning-targets/Dockerfile
You can also scan a Dockerfile by embedding and running the Trivy scan during the build, e.g., scanning-targets/Dockerfile.
docker build -t scanned-image scanning-targets/
The --exit-code
specifies the exit code when any security issues are found, thus running it with the example from the Dockerfile in scanning-targets/ will fail the Dockerbuild if the status code is 1 (which in this case it is).
The output:
[+] Building 16.2s (5/5) FINISHED => [internal] load build definition from Dockerfile 0.0s => => transferring dockerfile: 262B 0.0s => [internal] load .dockerignore 0.0s => => transferring context: 2B 0.0s => [internal] load metadata for docker.io/library/alpine:3.7 0.6s => CACHED [1/2] FROM docker.io/library/alpine:3.7@sha256:8421d9a84432575381bfabd248f1eb56f3aa21d9d7cd2511583c68c9 0.0s => ERROR [2/2] RUN apk add curl && curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/con 15.5s ------ > [2/2] RUN apk add curl && curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin && trivy filesystem --exit-code 1 --no-progress /: #5 0.366 fetch http://dl-cdn.alpinelinux.org/alpine/v3.7/main/x86_64/APKINDEX.tar.gz #5 0.634 fetch http://dl-cdn.alpinelinux.org/alpine/v3.7/community/x86_64/APKINDEX.tar.gz #5 0.778 (1/4) Installing ca-certificates (20190108-r0) #5 0.852 (2/4) Installing libssh2 (1.9.0-r1) #5 0.912 (3/4) Installing libcurl (7.61.1-r3) #5 0.986 (4/4) Installing curl (7.61.1-r3) #5 1.051 Executing busybox-1.27.2-r11.trigger #5 1.056 Executing ca-certificates-20190108-r0.trigger #5 1.119 OK: 6 MiB in 17 packages #5 1.330 aquasecurity/trivy info checking GitHub for latest tag #5 1.892 aquasecurity/trivy info found version: 0.41.0 for v0.41.0/Linux/64bit #5 8.685 aquasecurity/trivy info installed /usr/local/bin/trivy #5 9.131 2023-05-07T07:28:11.532Z INFO Need to update DB #5 9.131 2023-05-07T07:28:11.532Z INFO DB Repository: ghcr.io/aquasecurity/trivy-db #5 9.131 2023-05-07T07:28:11.532Z INFO Downloading DB... #5 14.80 2023-05-07T07:28:17.195Z INFO Vulnerability scanning is enabled #5 14.80 2023-05-07T07:28:17.196Z INFO Secret scanning is enabled #5 14.80 2023-05-07T07:28:17.196Z INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning #5 14.80 2023-05-07T07:28:17.196Z INFO Please see also https://aquasecurity.github.io/trivy/v0.41/docs/secret/scanning/#recommendation for faster secret detection #5 14.99 2023-05-07T07:28:17.393Z INFO Detected OS: alpine #5 14.99 2023-05-07T07:28:17.393Z INFO Detecting Alpine vulnerabilities... #5 14.99 2023-05-07T07:28:17.394Z INFO Number of language-specific files: 0 #5 14.99 2023-05-07T07:28:17.394Z WARN This OS version is no longer supported by the distribution: alpine 3.7.3 #5 14.99 2023-05-07T07:28:17.394Z WARN The vulnerability detection may be insufficient because security updates are not provided #5 15.00 #5 15.00 localhost (alpine 3.7.3) #5 15.00 ======================== #5 15.00 Total: 2 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 2) #5 15.00 #5 15.00 ââââââââââââââŹâââââââââââââââââŹâââââââââââŹââââââââââââââââââââŹââââââââââââââââŹâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ #5 15.00 â Library â Vulnerability â Severity â Installed Version â Fixed Version â Title â #5 15.00 ââââââââââââââŒâââââââââââââââââŒâââââââââââŒââââââââââââââââââââŒââââââââââââââââŒââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ†#5 15.00 â musl â CVE-2019-14697 â CRITICAL â 1.1.18-r3 â 1.1.18-r4 â musl libc through 1.1.23 has an x87 floating-point stack â #5 15.00 â â â â â â adjustment im ...... â #5 15.00 â â â â â â https://avd.aquasec.com/nvd/cve-2019-14697 â #5 15.00 âââââââââââââ†â â â â â #5 15.00 â musl-utils â â â â â â #5 15.00 â â â â â â â #5 15.00 â â â â â â â #5 15.00 ââââââââââââââŽâââââââââââââââââŽâââââââââââŽââââââââââââââââââââŽââââââââââââââââŽâââââââââââââââââââââââââââââââââââââââââââââââââââââââââââ ------ executor failed running [/bin/sh -c apk add curl && curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/master/contrib/install.sh | sh -s -- -b /usr/local/bin && trivy filesystem --exit-code 1 --no-progress /]: exit code: 1The .github/workflows/trivy-scann.yaml show how to integrate Dockerfile scanning using Trivy and GH Action. You will find the results in the Security tab in GH.
To create a cluster, run the following command:
kind create cluster --name trivy-demo
kind get kubeconfig --name trivy-demo > ~/.kube/config
Following the instructions here to install Trivy using Helm.
k get vulnerabilityreports.aquasecurity.github.io
k get vulnerabilityreports.aquasecurity.github.io {report-name} -o yaml