You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: .github/DISCUSSION_TEMPLATE/documentation.yml
+1-1
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ body:
7
7
Feel free to create a docs report if something doesn't work as expected or is unclear in the documentation.
8
8
Please ensure that you're not creating a duplicate report by searching the [issues](https://github.com/aquasecurity/trivy/issues)/[discussions](https://github.com/aquasecurity/trivy/discussions) beforehand.
9
9
10
-
Please also check [our contribution guidelines](https://aquasecurity.github.io/trivy/latest/community/contribute/discussion/).
10
+
Please also check [our contribution guidelines](https://trivy.dev/latest/community/contribute/discussion/).
See [Issues](https://aquasecurity.github.io/trivy/latest/community/contribute/issue/) and [Pull Requests](https://aquasecurity.github.io/trivy/latest/community/contribute/pr/)
1
+
See [Issues](https://trivy.dev/latest/community/contribute/issue/) and [Pull Requests](https://trivy.dev/latest/community/contribute/pr/)
Copy file name to clipboardexpand all lines: docs/commercial/compare.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ If you'd like to learn more or request a demo, [click here to contact us](./cont
66
66
67
67
| Feature | Trivy OSS | Aqua |
68
68
| --- | --- | --- |
69
-
| Infrastructure as Code (IaC) | Many popular languages as detailed [here](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/policy/builtin/)| In addition, Build Pipeline configuration scanning |
69
+
| Infrastructure as Code (IaC) | Many popular languages as detailed [here](https://trivy.dev/latest/docs/scanner/misconfiguration/policy/builtin/)| In addition, Build Pipeline configuration scanning |
70
70
| Checks customization | Create custom checks with Rego | Create custom checks in no-code interface <br> Customize existing checks with organizational preferences |
2023-08-31T11:10:27.155+0600 INFO Vulnerability scanning is enabled
395
395
2023-08-31T11:10:27.155+0600 INFO Secret scanning is enabled
396
396
2023-08-31T11:10:27.155+0600 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
397
-
2023-08-31T11:10:27.155+0600 INFO Please see also https://aquasecurity.github.io/trivy/dev/docs/scanner/secret/#recommendation for faster secret detection
397
+
2023-08-31T11:10:27.155+0600 INFO Please see also https://trivy.dev/dev/docs/scanner/secret/#recommendation for faster secret detection
398
398
2023-08-31T11:10:29.164+0600 INFO Detected OS: alpine
399
399
2023-08-31T11:10:29.164+0600 INFO Detecting Alpine vulnerabilities...
400
400
2023-08-31T11:10:29.169+0600 INFO Number of language-specific files: 1
2022-09-16T17:37:13.258+0900 INFO Vulnerability scanning is enabled
23
23
2022-09-16T17:37:13.258+0900 INFO Secret scanning is enabled
24
24
2022-09-16T17:37:13.258+0900 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
25
-
2022-09-16T17:37:13.258+0900 INFO Please see also https://aquasecurity.github.io/trivy/dev/docs/secret/scanning/#recommendation for faster secret detection
25
+
2022-09-16T17:37:13.258+0900 INFO Please see also https://trivy.dev/dev/docs/secret/scanning/#recommendation for faster secret detection
26
26
2022-09-16T17:37:14.827+0900 INFO Detected SBOM format: cyclonedx-json
27
27
2022-09-16T17:37:14.901+0900 INFO Found SBOM (cyclonedx) attestation in Rekor
28
28
2022-09-16T17:37:14.903+0900 INFO Detected OS: alpine
2022-10-25T21:00:50.972+0300 INFO Vulnerability scanning is enabled
492
492
2022-10-25T21:00:50.972+0300 INFO Secret scanning is enabled
493
493
2022-10-25T21:00:50.972+0300 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
494
-
2022-10-25T21:00:50.972+0300 INFO Please see also https://aquasecurity.github.io/trivy/dev/docs/secret/scanning/#recommendation for faster secret detection
494
+
2022-10-25T21:00:50.972+0300 INFO Please see also https://trivy.dev/dev/docs/secret/scanning/#recommendation for faster secret detection
495
495
2022-10-25T21:00:56.190+0300 INFO Detected OS: alpine
496
496
2022-10-25T21:00:56.190+0300 INFO Detecting Alpine vulnerabilities...
497
497
2022-10-25T21:00:56.191+0300 INFO Number of language-specific files: 0
Copy file name to clipboardexpand all lines: docs/tutorials/misconfiguration/custom-checks.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# Custom Checks with Rego
2
2
3
-
Trivy can scan configuration files for common security issues (a.k.a IaC misconfiguration scanning). In addition to a comprehensive built in database of checks, you can add your own custom checks. Checks are written in [Rego](https://www.openpolicyagent.org/docs/latest/policy-language/) language and the full documentation for checks and customizing them is available [here](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/custom/).
3
+
Trivy can scan configuration files for common security issues (a.k.a IaC misconfiguration scanning). In addition to a comprehensive built in database of checks, you can add your own custom checks. Checks are written in [Rego](https://www.openpolicyagent.org/docs/latest/policy-language/) language and the full documentation for checks and customizing them is available [here](https://trivy.dev/latest/docs/scanner/misconfiguration/custom/).
4
4
5
5
This tutorial will walk you through writing a custom check in Rego that checks for an issue in a Dockerfile.
6
6
@@ -38,7 +38,7 @@ Next, we need to specify metadata about the check. This is information that help
38
38
39
39
Important: The `METADATA` has to be defined on top of the file.
40
40
41
-
More information on the different fields in the metadata can be found in the [Trivy documentation.](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/custom/)
41
+
More information on the different fields in the metadata can be found in the [Trivy documentation.](https://trivy.dev/latest/docs/scanner/misconfiguration/custom/)
Copy file name to clipboardexpand all lines: docs/tutorials/misconfiguration/terraform.md
+7-7
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ We have been consolidating all of our scanning-related efforts in one place, and
9
9
10
10
## Trivy Config Command
11
11
12
-
Terraform configuration scanning is available as part of the `trivy config` command. This command scans all configuration files for misconfiguration issues. You can find the details within [misconfiguration scans in the Trivy documentation.](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/)
12
+
Terraform configuration scanning is available as part of the `trivy config` command. This command scans all configuration files for misconfiguration issues. You can find the details within [misconfiguration scans in the Trivy documentation.](https://trivy.dev/latest/docs/scanner/misconfiguration/)
13
13
14
14
Command structure:
15
15
```
@@ -23,7 +23,7 @@ The `trivy config` command can scan Terraform configuration, CloudFormation, Doc
23
23
- If the configuration that has been defined does not follow best practices, the check will fail.
24
24
25
25
### Prerequisites
26
-
Install Trivy on your local machines. The documentation provides several [different installation options.](https://aquasecurity.github.io/trivy/latest/getting-started/installation/)
26
+
Install Trivy on your local machines. The documentation provides several [different installation options.](https://trivy.dev/latest/getting-started/installation/)
27
27
This tutorial will use this example [Terraform tutorial](https://github.com/Cloud-Native-Security/trivy-demo/tree/main/bad_iac/terraform) for terraform misconfiguration scanning with Trivy.
28
28
29
29
Git clone the tutorial and cd into the directory:
@@ -83,14 +83,14 @@ trivy config --severity CRITICAL, MEDIUM terraform-infra
83
83
84
84
### Passing tf.tfvars files into `trivy config` scans
85
85
86
-
You can pass terraform values to Trivy to override default values found in the Terraform HCL code. More information are provided [in the documentation.](https://aquasecurity.github.io/trivy/latest/docs/coverage/iac/terraform/#value-overrides)
86
+
You can pass terraform values to Trivy to override default values found in the Terraform HCL code. More information are provided [in the documentation.](https://trivy.dev/latest/docs/coverage/iac/terraform/#value-overrides)
87
87
88
88
```
89
89
trivy config --tf-vars terraform.tfvars ./
90
90
```
91
91
### Custom Checks
92
92
93
-
We have lots of examples in the [documentation](https://aquasecurity.github.io/trivy/latest/docs/scanner/misconfiguration/custom/) on how you can write and pass custom Rego checks into terraform misconfiguration scans.
93
+
We have lots of examples in the [documentation](https://trivy.dev/latest/docs/scanner/misconfiguration/custom/) on how you can write and pass custom Rego checks into terraform misconfiguration scans.
94
94
95
95
## Secret and vulnerability scans
96
96
@@ -100,15 +100,15 @@ The `trivy config` command does not perform secrete and vulnerability checks out
100
100
trivy fs --scanners secret,misconfig ./
101
101
```
102
102
103
-
The `trivy config` command is a sub-command of the `trivy fs` command. You can learn more about this command in the [documentation.](https://aquasecurity.github.io/trivy/latest/docs/target/filesystem/)
103
+
The `trivy config` command is a sub-command of the `trivy fs` command. You can learn more about this command in the [documentation.](https://trivy.dev/latest/docs/target/filesystem/)
104
104
105
105
## Scanning Terraform Plan files
106
106
107
-
Instead of scanning your different Terraform resources individually, you could also scan your Terraform Plan file before it is deployed for misconfiguration. This will give you insights into any misconfiguration of your resources as they would become deployed. [Here](https://aquasecurity.github.io/trivy/latest/docs/coverage/iac/terraform/#terraform) is the link to the documentation.
107
+
Instead of scanning your different Terraform resources individually, you could also scan your Terraform Plan file before it is deployed for misconfiguration. This will give you insights into any misconfiguration of your resources as they would become deployed. [Here](https://trivy.dev/latest/docs/coverage/iac/terraform/#terraform) is the link to the documentation.
108
108
109
109
Note that you need to be able to create a terraform init and plan without any errors.
110
110
111
111
## Using Trivy in your CI/CD pipeline
112
-
Similar to tfsec, Trivy can be used either on local developer machines or integrated into your CI/CD pipeline. There are several steps available for different pipelines, including GitHub Actions, Circle CI, GitLab, Travis and more in the tutorials section of the documentation: [https://aquasecurity.github.io/trivy/latest/tutorials/integrations/](https://aquasecurity.github.io/trivy/latest/tutorials/integrations/)
112
+
Similar to tfsec, Trivy can be used either on local developer machines or integrated into your CI/CD pipeline. There are several steps available for different pipelines, including GitHub Actions, Circle CI, GitLab, Travis and more in the tutorials section of the documentation: [https://trivy.dev/latest/tutorials/integrations/](https://trivy.dev/latest/tutorials/integrations/)
0 commit comments