Add Trivy Version, Trivy-DB date/version, Java-DB date/version to output #9400
Replies: 6 comments 4 replies
-
|
HI @wagner-robert ! Do you want to see information about component versions in the report (table or json)? |
Beta Was this translation helpful? Give feedback.
-
|
The JSON would be a good start (for machine ingestion), followed by the table template (for human review). From there we will customize an internal template to include the data (I just need to know the field names). |
Beta Was this translation helpful? Give feedback.
-
|
It's not in the report as you mentioned but you could get it all by running the trivy version --format json
{"Version":"0.64.0-54-g50bc4c2b1","VulnerabilityDB":{"Version":2,"NextUpdate":"2025-08-27T18:26:23.952100722Z","UpdatedAt":"2025-08-26T18:26:23.952100882Z","DownloadedAt":"2025-08-26T23:06:32.941928Z"},"CheckBundle":{"Digest":"sha256:6127ec64475c78cd2b044cc0acd585584f8386136f9f78353f151300192fdf59","DownloadedAt":"2025-08-27T01:11:17.861989Z"}}trivy version
trivy Version: 0.64.0-54-g50bc4c2b1
Vulnerability DB:
Version: 2
UpdatedAt: 2025-08-26 18:26:23.952100882 +0000 UTC
NextUpdate: 2025-08-27 18:26:23.952100722 +0000 UTC
DownloadedAt: 2025-08-26 23:06:32.941928 +0000 UTC
Check Bundle:
Digest: sha256:6127ec64475c78cd2b044cc0acd585584f8386136f9f78353f151300192fdf59
DownloadedAt: 2025-08-27 01:11:17.861989 +0000 UTC |
Beta Was this translation helpful? Give feedback.
-
|
I think it's a good idea |
Beta Was this translation helpful? Give feedback.
-
|
@simar7 Thanks for the option. I am aware of running the version information to get those details, but it would be more eloquent if this information was included in the image scan output - that way we don't need to request a second file or second command line run. This would also be useful for integration into down-stream tools that could detect old, obsolete version of Trivy running. As everyone knows, having a scanner that someone forgot to update may mislead one into believing there are no issues, when there may be several critical flaws that need remediation. Thanks again for looking into this. |
Beta Was this translation helpful? Give feedback.
-
|
From a debugging standpoint, I am not sure if something like the binary hash or other metadata added to the JSON file would allow you to determine exactly which binary they are using (self-compiled vs Linux 86 vs Linux 64 vs MacOS etc...). This may assist with determining if there is a systemic issue with a particular pre-built or user-built binary. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
All, It will be difficult for an assessment team to accept the output from Trivy while it lacks some basic information - Add Trivy Version, Trivy-DB date/version, Java-DB date/version and Check details.
There will be considerable difference for disconnected systems running an old report/version versus a current version. I don't know if the detection will change from version to version.
An organization that requires monthly scans, using a current version (latest - .1), with current trivy-db files (within the last week) will not be able to tell if any of those requirements are being met. I don't see that data in the JSON output, so I don't know if those fields are available to templates.
We are looking at this tool for compliance scans, but it cannot be used without this data.
Target
None
Scanner
Vulnerability
Beta Was this translation helpful? Give feedback.
All reactions