I am implementing Trivy as part of my DevSecOps process in the CSCD pipelines to scan my container applications and container images.
Senior Engineering Manager at Ninjacart
Good integrations for more observability and an open-source setup
Pros and Cons
- "I can see vulnerabilities in the images of any applications deployed in the Kubernetes environment or as container applications."
- "I definitely recommend Trivy."
- "For malware detection, I need to use two tools: Trivy as my anomaly scanner and ClamAV. I am integrating these two tools into the CI pipeline. If both malware and anomaly detection could be managed by one tool, I would not need to depend on two tools."
- "For malware detection, I need to use two tools: Trivy as my anomaly scanner and ClamAV. I am integrating these two tools into the CI pipeline. If both malware and anomaly detection could be managed by one tool, I would not need to depend on two tools. That would be my suggestion."
What is our primary use case?
What is most valuable?
I can see vulnerabilities in the images of any applications deployed in the Kubernetes environment or as container applications.
Prior to deploying to production, I can identify the vulnerabilities and find ways to fix them. I can check for any libraries that are expired, and it also performs dependency checks, allowing me to fix these issues before making my production system vulnerable.
I have integrated this with Grafana as part of my observability stack. I use Grafana as an observability stack and have integrated this report with it. I am able to see those metrics from there.
What needs improvement?
For malware detection, I need to use two tools: Trivy as my anomaly scanner and ClamAV. I am integrating these two tools into the CI pipeline. If both malware and anomaly detection could be managed by one tool, I would not need to depend on two tools. That would be my suggestion.
For how long have I used the solution?
I have been using Trivy for one year.
Buyer's Guide
Trivy
March 2026
Learn what your peers think about Trivy. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,264 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
I have multiple pods, and an auto-scaler is enabled.
How are customer service and support?
Internally, we have a cybersecurity specialization team in my office. I don't see much critical difference as they are aware of these things.
Which solution did I use previously and why did I switch?
Previously, I used Trivy and OpenVAS.
How was the initial setup?
I didn't encounter any issues since Trivy is open-source and provided all-in-one packages like Helm charts and supported documentation. It was straightforward for me. I spent time understanding the industry and completed my cybersecurity certification from IIM, where I learned about using Trivy and OpenVAS. This experience helped me become familiar with Trivy. I didn't face many challenges since I have a solid understanding of Kubernetes and authorization.
Which other solutions did I evaluate?
I considered OpenVAS, which is user-friendly for container applications. However, OpenVAS is primarily based on virtual machines, designed mainly for virtual missions and on-premises setups.
What other advice do I have?
I definitely recommend Trivy. Many companies are migrating to container platforms. It integrates well with observability stacks like ELK or Grafana Datadog. I advise using these tools for observability integration. I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Software Engineer at a manufacturing company with 10,001+ employees
Seamlessly integrates with CI/CD pipeline for effective security and malware testing
Pros and Cons
- "The most valuable feature of Trivy is its easy integration with the CI/CD pipeline."
- "The most valuable feature of Trivy is its easy integration with the CI/CD pipeline."
- "The reporting could be a little better."
- "The reporting could be a little better. When integrating Trivy with CI, the interpretation of the reports could be improved."
What is our primary use case?
We are using Trivy for status analysis tests of our code bases, primarily for security and malware testing.
What is most valuable?
The most valuable feature of Trivy is its easy integration with the CI/CD pipeline. It allows for seamless scanning of the entire code base in GitHub, making it very scalable based on how it is deployed in conjunction with CI. It has greatly facilitated our security testing and analysis processes.
What needs improvement?
The reporting could be a little better. When integrating Trivy with CI, the interpretation of the reports could be improved. The only aspect that seems to require more effort is understanding the reporting, which might need some attention.
For how long have I used the solution?
I have used Trivy for one to two months.
What do I think about the stability of the solution?
Trivy is stable. With my usage so far, I haven't encountered any major stability issues.
What do I think about the scalability of the solution?
Trivy is very scalable. With its integration into our CI setup, it can scan the whole code base efficiently. However, there might be a learning curve when using it on a standalone basis.
How are customer service and support?
I haven't had the chance to talk to the support team, so I have no direct experience with their customer service. However, the documentation is good, and it helped me navigate through the setup.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have different static analysis tools like Coverity or Bandit, however, they are not alternatives to Trivy. We use multiple methods for scanning, and Trivy complements these other tools.
How was the initial setup?
The initial setup was easy, and it took just a couple of days for deployment.
What about the implementation team?
I used a third party for the implementation. Trivy GitHub CI has a third-party GitHub action that I could use directly.
Which other solutions did I evaluate?
I didn't evaluate other options personally. Different options are used within my company. I don't recall the names.
What other advice do I have?
I would recommend starting to use Trivy and explore the documentation, as it is quite comprehensive. Understanding the project pipeline first is important, as it affects the configuration and integration process. This understanding is crucial for integrating Trivy into your security pipeline.
I'd rate the solution eight out of ten.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer.
Buyer's Guide
Trivy
March 2026
Learn what your peers think about Trivy. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,264 professionals have used our research since 2012.
Framework Engineer at a tech services company with 1,001-5,000 employees
Customize vulnerability scanning with ease and offers a straightforward setup process
Pros and Cons
- "It's customizable, allowing me to add any rules and format HTML templates as I wish."
- "One of the great features of Trivy is that it helps me scan items such as AWS credentials and GCP service accounts."
- "Trivy can improve by providing an output in PDF format."
- "Trivy can improve by providing an output in PDF format. Additionally, it takes longer to scan container images built with many layers."
What is our primary use case?
I use Trivy in pipelines to scan for vulnerabilities in our code, container systems, and documents. This helps me address any issues I find with the suitable developer who has worked on it.
What is most valuable?
One of the great features of Trivy is that it helps me scan items such as AWS credentials and GCP service accounts. It's customizable, allowing me to add any rules and format HTML templates as I wish. The setup process of implementing Trivy in my pipelines was straightforward, taking no more than ten minutes.
What needs improvement?
Trivy can improve by providing an output in PDF format.
Additionally, it takes longer to scan container images built with many layers. The exporting options could be better, including integration with AWS or GCP. Many open issues in GitHub could be addressed to avoid bugs and ensure a stable environment.
For how long have I used the solution?
I've been working with the Trivy solution for eight to ten months.
What do I think about the stability of the solution?
Trivy is quite stable compared to other tools.
What do I think about the scalability of the solution?
Trivy is not scalable if I need to scan 50 or 100 resources at once. While scalable for file system scans, it's not suitable for scanning multiple container images at once.
How are customer service and support?
Being open source, I've raised issues on GitHub, and they were taken up quickly. However, it takes some time to implement changes and bring them into the stable version. They usually suggest opting for the enterprise version for personalized issues.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I shortlisted Snyk and DockerBank Security, however, Trivy turned out to be better, mainly because it is open source and scans file systems and container systems, including Kubernetes clusters.
How was the initial setup?
The initial setup was very straightforward and easy, taking less than ten minutes.
What about the implementation team?
I handled it myself using the Azure pipeline and CLI.
Which other solutions did I evaluate?
I shortlisted Snyk and DockerBank Security.
What other advice do I have?
I would definitely recommend Trivy to others looking for an open-source file system scanner, Kubernetes cluster scanner, or container image vulnerability scanner. However, for someone with the budget, Trivy's scalability may be an issue.
Overall, I rate Trivy eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cybersecurity & DevSecOps Lead at WhizAI
Enables efficient integration with seamless vulnerability detection
Pros and Cons
- "Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images."
- "Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images."
- "The only problem is that Trivy does not support reporting features such as generating reports in CSV, which is useful for auditing and reporting."
- "The only problem is that Trivy does not support reporting features such as generating reports in CSV, which is useful for auditing and reporting."
What is our primary use case?
I use Trivy for CICD and container scanning.
What is most valuable?
Trivy is easy to integrate with CI/CD and can be installed on desktops to scan images. It helps with all configurations, including scanning of images and file systems, and even detecting secrets, not just vulnerabilities. It is very lightweight, requiring minimal effort to get it working. Trivy catches most vulnerabilities quickly because it does not take time to scan anything.
What needs improvement?
The only problem is that Trivy does not support reporting features such as generating reports in CSV, which is useful for auditing and reporting.
Additionally, Trivy should work as a Software Composition Analysis tool. If Trivy could do this, it would be great.
For how long have I used the solution?
I have been working with Trivy for more than four years.
What do I think about the stability of the solution?
I find Trivy to be stable.
What do I think about the scalability of the solution?
I do not have to scale Trivy itself. I have to scale the part or the tool that is scanning the images. Each instance is a complete system that can scan as many images as are passed through that scanning stage.
How are customer service and support?
We are using the open source community, so we do not need customer service support. If anything happens, we go on GitHub to find a solution.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have been using Trivy from the beginning. We also have another scanner, New Vector, but our primary scanner is Trivy.
How was the initial setup?
The initial setup is straightforward, not just for me, but also for other developers who find it easy to set up and run. We installed Trivy in the container and used it for scanning other images. The setup process is quick and takes approximately five minutes.
Which other solutions did I evaluate?
We tried QEscape and some other new solutions, however, we settled with Trivy. I am not sure about money savings. I have not explored any other commercial software.
What other advice do I have?
Trivy is a Swiss knife. I recommend it because it is easy to integrate and provides quick results.
On a scale of one to ten, I rate it nine out of ten for vulnerability scanning.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Trivy Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Container SecurityPopular Comparisons
Wiz
SentinelOne Singularity Cloud Security
Snyk
Microsoft Defender for Cloud
Prisma Cloud by Palo Alto Networks
Veracode
Qualys VMDR
CrowdStrike Falcon Cloud Security
JFrog Xray
Orca Security
FortiCNAPP
Aqua Cloud Security Platform
Sysdig Secure
Aikido Security
SUSE NeuVector
Buyer's Guide
Download our free Trivy Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- When evaluating Container Security, what aspect do you think is the most important to look for?
- What tools do you rely on for building a DevSecOps pipeline?
- Container vs VM: What are the main differences?
- What do you look for in a container security solution?
- What container security solution are you using?
- Which Container Image Security tool is the best in the current market?
- Why is Container Security software important for companies?
- Why is Container Security important for companies?
- What are some tips for ensuring that containers are secure?
- What container security solution are you using? Do you recommend it?

















