vulnerability

Vulnerability scan with Trivy

Trivy vulnerability scan