Prepare for v0.57.0 #7808
Closed
knqyf263
started this conversation in
Development
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Draft to collaborate on v0.57.0
📑 Table of Contents
trivy registryCommand for Authentication 🔑pom.xmlfile fields 👾operating_systemfield for OS packages ✂️publicNetworkAccessfor Azure Storage Account 🔒💔 Breaking Changes 💔
🐾 Dropping support for "Exceptions" in misconfiguration scanning⚠️
We have previously announced intention to deprecate conftest style Exceptions. In this release we have removed Exceptions from misconfiguration scanning report.
Before
After
NB Ignores are still listed as part of the regular log output
☸ Kubernetes Pod report supports multiple containers 📦
This release adds support for scanning multi-container Kubernetes Pods. In order to aggregate findings from multiple containers in the same report, the
Findings[].Metadatafield for Pods, which used to be an object describing a single pod, has changed to an array of objects each describing a pod. See example output in the feature announcement below.Report before change
Report after change
Thanks @smtan-gl
🚀 What's new? 🚀
🔐 New
trivy registryCommand for Authentication 🔑This release introduces the
trivy registrycommand, providing an alternative todocker loginanddocker logoutfor environments without container runtimes like Docker. Now, you can authenticate directly with Trivy to access private container registries.For more details, please refer to the document
🧩 Enhanced CycloneDX Reports with File Checksums 🔗
This update enriches CycloneDX SBOMs by adding file checksums (such as SHA-1), a feature previously exclusive to SPDX reports. Now, JAR files and other relevant files in CycloneDX reports include checksums, boosting traceability and ensuring integrity verification across software components.
Thanks to @Churro for implementing this change.
🏴 Trimming whitespace in
pom.xmlfile fields 👾Trivy now correctly followed Maven (
mnv) behavior of trimming leading and trailing whitespace forpom.xmlfields (ArtifactID,GroupID, etc).Thanks @sgaist
📜 GitLab template supports
operating_systemfield for OS packages ✂️Trivy now populates the
operating_systemfield for OS package vulnerabilities.Thanks @aarongoldenthal
🐦 Ubuntu 24.10 is now supported 🟠
Trivy correctly detects vulnerabilities for Ubuntu 24.10.
Thanks @itsdean
🔍 Show misconfig ID in table output 🏷️
Trivy now includes misconfiguration IDs directly in the table output, making it easier to reference or ignore specific issues.
🌐 Handle
publicNetworkAccessfor Azure Storage Account 🔒Added a check for public network access to storage accounts. By default, storage accounts allow connections from any network, potentially exposing sensitive data. This update ensures that public access is appropriately restricted where needed.
🕵️♂️ Detect secrets leaks in Dockerfile 🐳
Added a check for potential secrets leakage in Dockerfiles. This check is triggered in the following cases:
ARG GITHUB_TOKENRUN aws configure set aws_access_key_id test-id && \ aws configure set aws_secret_access_key test-keyThis check can accept custom environment variables:
These measures help prevent the accidental exposure of sensitive information during the build process.
👷♂️ Notable Fixes 🛠️
versionandscopefrom root DepManagement in parent dependencies #7539vprefix from versions #7711Beta Was this translation helpful? Give feedback.
All reactions