<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Vulnerability Scanning on ARI Systems</title>
    <link>https://aripd.com/tags/vulnerability-scanning/</link>
    <description>Recent content in Vulnerability Scanning on ARI Systems</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <copyright>ARI Systems</copyright>
    <lastBuildDate>Sat, 16 May 2026 06:19:44 +0000</lastBuildDate>
    <atom:link href="https://aripd.com/tags/vulnerability-scanning/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>trivy</title>
      <link>https://aripd.com/blog/trivy/</link>
      <pubDate>Sun, 09 Oct 2022 00:11:00 +0000</pubDate>
      <guid>https://aripd.com/blog/trivy/</guid>
      <description>&lt;p&gt;Trivy is an open-source security and misconfiguration scanner. It works at every level: it can check the code in a Git repository, examine container images, advise regarding configuration files, look into Kubernetes deployments, and verify Infrastructure as Code (IaC).&lt;/p&gt;&#xA;&lt;h2 id=&#34;installation&#34;&gt;installation &lt;a href=&#34;#installation&#34; class=&#34;permalink&#34;&gt;&lt;i class=&#34;bi bi-link-45deg&#34;&gt;&lt;/i&gt;&lt;/a&gt;&lt;/h2&gt;&lt;div class=&#34;code-container&#34;&gt;&#xA;    &lt;div class=&#34;code-block&#34;&gt;&#xA;        &lt;div&gt;&#xA;            &#xA;            &lt;div class=&#34;code-copy&#34; style=&#34;float: right&#34;&gt;&#xA;                &lt;a class=&#34;icon-link icon-link-hover link-opacity-50 link-opacity-100-hover&#34; href=&#34;#&#34; aria-label=&#34;Copy code&#34;&gt;Copy&lt;/a&gt;&#xA;            &lt;/div&gt;&#xA;        &lt;/div&gt;&#xA;        &lt;div class=&#34;highlight&#34;&gt;&lt;div style=&#34;color:#000;background-color:#fff;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&#xA;&lt;table style=&#34;border-spacing:0;padding:0;margin:0;border:0;&#34;&gt;&lt;tr&gt;&lt;td style=&#34;vertical-align:top;padding:0;margin:0;border:0;&#34;&gt;&#xA;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#000;background-color:#fff;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code&gt;&lt;span style=&#34;white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f&#34;&gt;1&#xA;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&#xA;&lt;td style=&#34;vertical-align:top;padding:0;margin:0;border:0;;width:100%&#34;&gt;&#xA;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#000;background-color:#fff;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;brew install trivy&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;&#xA;&lt;/div&gt;&#xA;&lt;/div&gt;&#xA;    &lt;/div&gt;&#xA;&lt;/div&gt;&lt;p&gt;The first time Trivy runs, it downloads the vulnerability database and creates a cache folder for results. You can clean it up with&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
