Files
trivy/docs/getting-started/signature-verification.md

2.7 KiB

Signature Verification

All binaries and container images are signed by Cosign.

Verifying container image

Use the following command for keyless verification:

cosign verify aquasec/trivy:<version> \
--certificate-identity-regexp 'https://github\.com/aquasecurity/trivy/\.github/workflows/.+' \
--certificate-oidc-issuer "https://token.actions.githubusercontent.com"

You should get the following output

Verification for index.docker.io/aquasec/trivy:latest --
The following checks were performed on each of these signatures:
   - The cosign claims were validated
   - Existence of the claims in the transparency log was verified offline
   - The code-signing certificate was verified using trusted certificate authority certificates

   ....

Verifying binary

Since Trivy v0.68.1, GitHub Releases provide sigstore signature bundles. Separate .sig and certificate (.pem) files are no longer published.

Download the required tarball and its associated .sigstore.json bundle file from the GitHub Release.

Use the following command for keyless verification:

cosign verify-blob-attestation <path to tarball> \
    --bundle <path to tarball>.sigstore.json \
    --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
    --certificate-identity 'https://github.com/aquasecurity/trivy/.github/workflows/reusable-release.yaml@refs/tags/<release tag>'

Example for trivy_0.68.1_Linux-64bit.tar.gz:

cosign verify-blob-attestation trivy_0.68.1_Linux-64bit.tar.gz \
    --bundle trivy_0.68.1_Linux-64bit.tar.gz.sigstore.json \
    --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
    --certificate-identity 'https://github.com/aquasecurity/trivy/.github/workflows/reusable-release.yaml@refs/tags/v0.68.1'

You should get the following output

Verified OK

Verifying a GPG signature

RPM and Deb packages are also signed by GPG.

Verifying RPM

The public key is available at https://aquasecurity.github.io/trivy-repo/rpm/public.key.

First, download and import the key:

curl https://aquasecurity.github.io/trivy-repo/rpm/public.key \
--output pub.key
rpm --import pub.key
rpm -q --queryformat "%{SUMMARY}\n" $(rpm -q gpg-pubkey)

You should get the following output:

gpg(trivy)

Then you can verify the signature:

curl -L https://github.com/aquasecurity/trivy/releases/download/<version>/<file name>.rpm \
--output trivy.rpm
rpm -K trivy.rpm

You should get the following output

trivy.rpm: digests signatures OK