v0.62.0 #8801
aqua-bot
announced in
Announcements
v0.62.0
#8801
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
📑 Table of Contents
🚀 What's new? 🚀
🖼️ Save image layer metadata in reports 🧱
Trivy’s JSON scan output now includes detailed per-layer metadata—each layer’s size, digest and diff ID are exposed under a new Metadata.Layers array.
Usage
Run Trivy with JSON formatting and inspect the Layers field in the report’s metadata:
$ trivy -q image aquasecurity/trivy -f json | jq .Metadata.Layers
This will output an array of objects like:
🧶 Yarn workspace support 🧩
Trivy now fully supports Yarn workspaces, improving dependency analysis for monorepo projects. Previously, Yarn workspace packages weren't individually identified, and the relationships between the root project and its workspaces were not clearly represented. With this update, Trivy explicitly recognizes both the root project and each workspace as distinct packages by extracting their respective
package.json
details. It also establishes clear workspace relationships between the root project and associated workspaces, accurately mapping their dependencies.This improvement ensures a more comprehensive and precise Software Bill of Materials (SBOM), facilitating enhanced vulnerability detection and dependency management.
🦀 Add Cargo root & workspace package relationships 🗂️
Trivy’s Rust/Cargo analyzer now detects and includes Cargo workspaces as packages (
relationship=workspace
) and properly marks the root package withrelationship=root
. Workspace members are saved as packages and automatically added as dependencies of the root package, while development dependencies are excluded for both root and workspace packages.Usage
Run a filesystem scan on a Cargo project and list all root and workspace packages:
You’ll see entries such as:
🛡️ Add support for new allowed sysctls in AVD-KSV-0026 ⚙️
Extended the check AVD-KSV-0026 to validate
sysctl
parameters allowed under the Kubernetes PodSecurity "baseline" policy.The check now:
--k8s-version
flag or automatic detection during cluster scans. If the version is unknown, the list from the latest supported Kubernetes version is used.Based on official policy definition:
https://kubernetes.io/docs/concepts/security/pod-security-standards/#baseline
Source (commit
44c230b
):https://github.com/kubernetes/kubernetes/blob/44c230bf5c321056e8bc89300b37c497f464f113/staging/src/k8s.io/pod-security-admission/policy/check_sysctls.go#L39-L51
📦 Add new check to restrict wildcard access to S3 resources ✳️
Introduced a new check AVD-AWS-0345 to disallow the creation of overly permissive IAM policies that grant unrestricted wildcard access to S3 resources. The check flags IAM policies and roles that allow dangerous S3 actions, such as
s3:*
,s3:g*
,s3:put*
, and others. It also considers the AWS managed policy AmazonS3FullAccess, which provides full access to S3 resources.🔧 Recommended action:
Create more restrictive S3 policies to avoid broad and potentially risky access permissions.
👷♂️ Notable Fixes 🛠️
evaluateStep
to correctly setEvalContext
for multiple instances of blocks #8555 Thanks @Emyrk🐟 Ecosystem Updates 🌳
🕵️ Trivy Operator
We've added some performance fixes in the upcoming release of Trivy operator. In particular we have improved the following:
Both of these improvements have resulted in a lower memory footprint of the operator. We will continue to enhance the performance of the operator going forwards.
✨ Trivy MCP Server - Experimental
We've started work on an MCP server for Trivy that can integrate with Cursor, Claude Desktop and VSCode (v1.99.0+) among others
For more information on how to use, check the Trivy MCP Repo. As always, we welcome feedback/suggestions and issues.
Beta Was this translation helpful? Give feedback.
All reactions