Try our new research platform with insights from 80,000+ expert users
Trivy Logo

Trivy pros and cons

4.3 out of 5
Badge Leader

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

Trivy's integration with CI/CD pipeline is seamless and efficient.
Customizability in adding rules and formatting HTML templates enhances user experience.
Trivy's open-source nature and comprehensive functionalities are highly valued.
Trivy's ability to scan for vulnerabilities in Kubernetes deployments and container applications is essential.
The capability to scan files, images, GitHub repositories, Infrastructure as Code, and Kubernetes adds significant value.

CONS

Reporting capabilities need improvement, including better report interpretation when integrated with CI and additional output formats such as PDF and CSV.
Trivy can benefit from dynamic scanning capability during runtime as it currently performs static scanning of container images.
Integrating Trivy with ClamAV is necessary for comprehensive malware and anomaly detection, which could be managed by one tool for efficiency.
There is a lack of built-in functionality for report analysis within CI/CD pipelines.
Trivy often generates false positives by flagging vulnerabilities that do not exist, suggesting a need for enhanced contextual analysis or filtering.
 

Trivy Pros review quotes

reviewer2599524 - PeerSpot reviewer
Software Engineer at a manufacturing company with 10,001+ employees
Dec 4, 2024
The most valuable feature of Trivy is its easy integration with the CI/CD pipeline.
reviewer2620167 - PeerSpot reviewer
Framework Engineer at a tech services company with 1,001-5,000 employees
Dec 20, 2024
It's customizable, allowing me to add any rules and format HTML templates as I wish.
GK
Principal DevSecOPs at a computer software company with 10,001+ employees
Dec 24, 2024
Trivy's open source nature and wide functionality are incredibly valuable.
Learn what your peers think about Trivy. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
880,844 professionals have used our research since 2012.
Jyothikumar C - PeerSpot reviewer
Senior Engineering Manager at Ninjacart
Jan 29, 2025
I can see vulnerabilities in the images of any applications deployed in the Kubernetes environment or as container applications.
Faizan Anwar - PeerSpot reviewer
Cloud DevOps Lead at Venturenox
Jan 30, 2025
It is open-source.
DA
Cybersecurity & DevSecOps Lead at WhizAI
Jan 31, 2025
Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images.
Utsav Sharma - PeerSpot reviewer
Senior Security Consultant at Ernst & Young
Feb 3, 2025
The vulnerability scanning feature is excellent as it supports various container capabilities like Docker and Sharma.
DK
DevOps Engineer at Interdiciplinary center
Feb 3, 2025
I appreciate Trivy for being open-source and not requiring any payment.
SK
Site Reliability Engineer at a tech vendor with 10,001+ employees
Apr 25, 2025
What I find valuable is the ease of setup with Trivy, including pre-defined operators that require minimal configuration.
SC
Project Associate Engineer at a tech vendor with 501-1,000 employees
Apr 28, 2025
Trivy is most valuable for its ability to scan all repository files and dependencies.
 

Trivy Cons review quotes

reviewer2599524 - PeerSpot reviewer
Software Engineer at a manufacturing company with 10,001+ employees
Dec 4, 2024
The reporting could be a little better.
reviewer2620167 - PeerSpot reviewer
Framework Engineer at a tech services company with 1,001-5,000 employees
Dec 20, 2024
Trivy can improve by providing an output in PDF format.
GK
Principal DevSecOPs at a computer software company with 10,001+ employees
Dec 24, 2024
A dynamic scanning capability during runtime would be a significant advantage.
Learn what your peers think about Trivy. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
880,844 professionals have used our research since 2012.
Jyothikumar C - PeerSpot reviewer
Senior Engineering Manager at Ninjacart
Jan 29, 2025
For malware detection, I need to use two tools: Trivy as my anomaly scanner and ClamAV. I am integrating these two tools into the CI pipeline. If both malware and anomaly detection could be managed by one tool, I would not need to depend on two tools.
Faizan Anwar - PeerSpot reviewer
Cloud DevOps Lead at Venturenox
Jan 30, 2025
In our CI/CD pipelines, Trivy lacks built-in functionality for report analysis.
DA
Cybersecurity & DevSecOps Lead at WhizAI
Jan 31, 2025
The only problem is that Trivy does not support reporting features such as generating reports in CSV, which is useful for auditing and reporting.
Utsav Sharma - PeerSpot reviewer
Senior Security Consultant at Ernst & Young
Feb 3, 2025
Trivy generates many false positives, flagging non-existent vulnerabilities.
DK
DevOps Engineer at Interdiciplinary center
Feb 3, 2025
Having little experience can hinder the ability to connect it to a user-friendly UI effectively.
SK
Site Reliability Engineer at a tech vendor with 10,001+ employees
Apr 25, 2025
The main area for improvement is in differentiating between OS and application-based vulnerabilities.
SC
Project Associate Engineer at a tech vendor with 501-1,000 employees
Apr 28, 2025
Trivy is not scalable; however, I have scanned very large projects with it. It is stable but not scalable according to my experience.