{"package":"github.com/aquasecurity/trivy","ecosystem":"go","latest_version":"v0.70.0","description":"Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more","license":"Apache-2.0","license_risk":"permissive","commercial_use_notes":"Permissive: commercial closed-source use OK; preserve the copyright notice.","homepage":"https://pkg.go.dev/github.com/aquasecurity/trivy","repository":"https://github.com/aquasecurity/trivy","downloads_weekly":34684,"health":{"score":87,"risk":"low","breakdown":{"maintenance":25,"popularity":10,"security":25,"maturity":15,"community":12},"deprecated":false,"max_score":100},"vulnerabilities":{"count":1,"critical":0,"high":0,"medium":0,"low":1,"details":[{"vuln_id":"CVE-2026-33634","severity":"unknown","summary":"Trivy ecosystem supply chain was briefly compromised in github.com/aquasecurity/trivy","affected_versions":">=0.69.4","fixed_version":null,"source":"osv","published_at":"2026-04-01T16:33:18Z","in_kev":true,"kev_date_added":"2026-03-26","kev_ransomware":"Unknown","epss_prob":0.16827,"epss_percentile":0.94972,"threat_tier":"actively_exploited"}],"actively_exploited_count":1,"likely_exploited_count":0},"versions":{"latest":"v0.70.0","total_count":186,"recent":["v0.0.7","v0.39.0","v0.38.0","v0.30.2","v0.24.4","v0.29.1","v0.2.0","v0.51.3","v0.4.2","v0.16.0","v0.30.1","v0.31.2","v0.25.4","v0.0.11","v0.18.3","v0.49.1","v0.69.2","v0.58.0","v0.59.0","v0.50.2"]},"metadata":{"deprecated":false,"deprecated_message":null,"maintainers_count":518,"first_published":null,"last_published":"2026-04-17T04:58:31Z","dependencies_count":0,"dependencies":[]},"bundle":null,"typescript":null,"known_issues":{"bugs_count":3,"bugs_severity":{"medium":2,"critical":1},"status_breakdown":{"fixed":3},"link":"/api/bugs/go/github.com/aquasecurity/trivy?version=v0.70.0","scope":"version","details":[{"title":"Credential leakage in github.com/aquasecurity/trivy","severity":"medium","status":"fixed","affected_version":null,"fixed_version":"0.51.2","url":"https://github.com/aquasecurity/trivy/security/advisories/GHSA-xcq4-m2r3-cmrj"},{"title":"Trivy possibly leaks registry credential when scanning images from malicious registries","severity":"medium","status":"fixed","affected_version":null,"fixed_version":"0.51.2","url":"https://github.com/aquasecurity/trivy/security/advisories/GHSA-xcq4-m2r3-cmrj"},{"title":"Trivy ecosystem supply chain was briefly compromised","severity":"critical","status":"fixed","affected_version":null,"fixed_version":"0.35.0","url":"https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23"}]},"historical_compromise":null,"recommendation":{"action":"safe_to_use","issues":[],"use_version":"v0.70.0","version_hint":null,"summary":"github.com/aquasecurity/trivy@v0.70.0 is safe to use (health: 87/100)"},"version_scoped":null,"requested_version":null,"_cache":"hit","_response_ms":0,"_powered_by":"depscope.dev — free package intelligence for AI agents","typosquat":{"is_suspected":false},"maintainer_trust":{"available":false},"malicious":{"is_malicious":false},"scorecard":{"available":false},"quality":{"available":false}}