2.7 KiB
Signature Verification
All binaries and container images are signed by Cosign.
Verifying container image
Use the following command for keyless verification:
cosign verify aquasec/trivy:<version> \
--certificate-identity-regexp 'https://github\.com/aquasecurity/trivy/\.github/workflows/.+' \
--certificate-oidc-issuer "https://token.actions.githubusercontent.com"
You should get the following output
Verification for index.docker.io/aquasec/trivy:latest --
The following checks were performed on each of these signatures:
- The cosign claims were validated
- Existence of the claims in the transparency log was verified offline
- The code-signing certificate was verified using trusted certificate authority certificates
....
Verifying binary
Since Trivy v0.68.1, GitHub Releases provide sigstore signature bundles. Separate .sig and certificate (.pem) files are no longer published.
Download the required tarball and its associated .sigstore.json bundle file from the GitHub Release.
Use the following command for keyless verification:
cosign verify-blob-attestation <path to tarball> \
--bundle <path to tarball>.sigstore.json \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
--certificate-identity 'https://github.com/aquasecurity/trivy/.github/workflows/reusable-release.yaml@refs/tags/<release tag>'
Example for trivy_0.68.1_Linux-64bit.tar.gz:
cosign verify-blob-attestation trivy_0.68.1_Linux-64bit.tar.gz \
--bundle trivy_0.68.1_Linux-64bit.tar.gz.sigstore.json \
--certificate-oidc-issuer=https://token.actions.githubusercontent.com \
--certificate-identity 'https://github.com/aquasecurity/trivy/.github/workflows/reusable-release.yaml@refs/tags/v0.68.1'
You should get the following output
Verified OK
Verifying a GPG signature
RPM and Deb packages are also signed by GPG.
Verifying RPM
The public key is available at https://aquasecurity.github.io/trivy-repo/rpm/public.key.
First, download and import the key:
curl https://aquasecurity.github.io/trivy-repo/rpm/public.key \
--output pub.key
rpm --import pub.key
rpm -q --queryformat "%{SUMMARY}\n" $(rpm -q gpg-pubkey)
You should get the following output:
gpg(trivy)
Then you can verify the signature:
curl -L https://github.com/aquasecurity/trivy/releases/download/<version>/<file name>.rpm \
--output trivy.rpm
rpm -K trivy.rpm
You should get the following output
trivy.rpm: digests signatures OK