Terminal.skills
Skills/trivy
>

trivy

Scan containers, filesystems, and repos for vulnerabilities with Trivy. Use when a user asks to scan Docker images for CVEs, audit filesystem for secrets, check IaC for misconfigurations, or add security scanning to CI.

#trivy#vulnerability#container#scanning#ci-cd
terminal-skillsv1.0.0
Works with:claude-codeopenai-codexgemini-clicursor
Source

Usage

$
✓ Installed trivy v1.0.0

Getting Started

  1. Install the skill using the command above
  2. Open your AI coding agent (Claude Code, Codex, Gemini CLI, or Cursor)
  3. Reference the skill in your prompt
  4. The AI will use the skill's capabilities automatically

Example Prompts

  • "Deploy the latest build to the staging environment and run smoke tests"
  • "Check the CI pipeline status and summarize any recent failures"

Documentation

Overview

Trivy is an open-source vulnerability scanner by Aqua Security. Scans container images, filesystems, git repos, and IaC for vulnerabilities, misconfigurations, and exposed secrets.

Instructions

Step 1: Install

bash
brew install trivy

Step 2: Container Scanning

bash
trivy image node:20-alpine
trivy image --severity CRITICAL,HIGH my-app:latest
trivy image --format json --output results.json my-app:latest

Step 3: Filesystem and Secret Scan

bash
trivy fs .
trivy fs --scanners vuln,secret,misconfig .

Step 4: IaC Scanning

bash
trivy config ./terraform/
trivy config ./k8s/

Guidelines

  • Free and open-source — no account needed.
  • Local vulnerability DB, updated automatically — scans are fast.
  • Supports SBOM generation (CycloneDX, SPDX) for compliance.
  • Use in CI to block deployments with critical CVEs.

Information

Version
1.0.0
Author
terminal-skills
Category
DevOps
License
Apache-2.0