Prepare for v0.55.0 #7371
Closed
simar7
started this conversation in
Development
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Draft to collaborate on v0.55.0
📑 Table of Contents
--detection-priorityFlag 🕵️testscope forpom.xmlfiles 🧪iteratorargument for dynamic blocks 🥂💔 Breaking Changes 💔
🗑️ Removal of deprecated SBOM flags 🛠️
In this release, we've removed the deprecated
--sbom-formatand--artifact-typeflags from thesbomsubcommand. These flags were deprecated two years ago, and their removal is part of our ongoing effort to streamline the CLI and remove outdated options.For more details, please refer to the announcement here.
🚀 What's new? 🚀
🎛️ Introducing the --detection-priority Flag 🕵️
This update introduces the
--detection-priorityflag to the vulnerability scanner, providing users with control over the scanner's accuracy and coverage. The flag allows you to select between precise mode, which focuses on reducing false positives, and comprehensive mode, which increases detection coverage at the risk of including some false positives. This feature is particularly useful in environments where either accuracy or comprehensive detection is critical.See here for more details.
The following language-specific files supported new flag. Logic for
--detection-priority comprehensive:go.mod: save minimum requiredGoversion asstdlib. Supported onlyGoafter 1.21. See here for more details.requirements.txt: save minimum version for pip packages. Supported only>=,~=and a trailing.*. See here for more details.pubspec.lock: use minimum versions fromsdksforSDKdependencies. See here for more details.📝 Support
testscope forpom.xmlfiles 🧪Trivy currently supports dependencies with
testscope. To include these dependencies into result - use--include-dev-depsflag.🥣 IaC scanning now supports generic YAML and JSON file types 🛼
Previously for Trivy to perform misconfiguration scanning, it had to confirm to one of the supported types. We've now added support for any generic YAML or JSON file type to be scanned. This is best demonstrated by an example:
For example consider the following inputs
With the new support, we can scan the input as such
You can also pass schemas using the
config-file-schemasflag. Trivy will use these schemas for file filtering and type checking in Rego checks. If the file does not match any of the passed schemas, it will be ignored.You can find more details on this feature here
🌰 Terraform scanning now supports
iteratorargument for dynamic blocks 🥂Trivy now supports the iterator argument for dynamic blocks. Previously this led to false positives while scanning terraform code. The following block is now supported with Trivy scanning
🎣 Terraform plan scanning now supports input variables 🏭
Trivy now supports scanning of terraform plans that contain variables inside of them. As always the user can pass the variables in as such:
$ trivy config --tf-vars vars.tfvars --misconfig-scanners "terraformplan-snapshot" tfplanWill now properly evaluate the passed input variables for the terraform plan being scanned.
🧳 Misconfiguration scanning now ignores duplicate checks 🍼
Trivy now ignores any duplicated checks in the output by skipping them if they've already been evaluated. This helps prevent cases where a duplicated custom check might be accidentally supplied by the user.
🪨 Compliance spec bundles are now included within the Trivy Checks bundle 🗿
Trivy checks bundle now includes compliance spec bundles. This provides users with up to date compliance specs without having to wait for an update of Trivy or it's dependencies as the compliance specs will now be released and available for use at the time of a new bundle being published.
🏃🏻♀️Terraform now supports ignores on nested attributes 🪺
Previously it was not possible to ignore on special variables such as
eachandcountthat terraform offers, especially when working within dynamic blocks.Will now ignore
each.valuewith thenameofvm-2. More info on this feature here💽 Support for Direct Filesystem 💾
This update enhances the
vmsubcommand by adding support for scanning filesystems directly, even when there's no Master Boot Record (MBR) present.Thanks to @yusuke-koyoshi.
🐧 Support for Ext2/Ext3 Filesystems 🧩
In this release, the
vmsubcommand has been enhanced to support Ext2 and Ext3 filesystems. This addition broadens the range of filesystems that can be scanned, making it more versatile for various virtual machine environments.Thanks to @aruneko.
👷♂️ Notable Fixes 🛠️
Messagefield not escaped inasff.tpl#7400Beta Was this translation helpful? Give feedback.
All reactions