Fixed broken link and some typos in Readme.md (#228)

* Fixing broken link and grammar in Readme.md

* Avoiding conflicts
This commit is contained in:
Greg Jacobs
2019-10-31 14:53:24 -05:00
committed by Teppei Fukuda
parent e04e90fcbc
commit f326beb1f2

View File

@@ -33,7 +33,7 @@ A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI
- [Save the results as JSON](#save-the-results-as-json)
- [Filter the vulnerabilities by severities](#filter-the-vulnerabilities-by-severities)
- [Filter the vulnerabilities by type](#filter-the-vulnerabilities-by-type)
- [Skip an update of vulnerability DB](#skip-an-update-of-vulnerability-db)
- [Skip an update of vulnerability DB](#skip-update-of-vulnerability-db)
- [Ignore unfixed vulnerabilities](#ignore-unfixed-vulnerabilities)
- [Specify exit code](#specify-exit-code)
- [Ignore the specified vulnerabilities](#ignore-the-specified-vulnerabilities)
@@ -62,7 +62,7 @@ A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI
`Trivy` (`tri` pronounced like **tri**gger, `vy` pronounced like en**vy**) is a simple and comprehensive vulnerability scanner for containers.
A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System.
`Trivy` detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn etc.).
`Trivy` is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify an image name of container.
`Trivy` is easy to use. Just install the binary and you're ready to scan. All you need to do for scanning is to specify an image name of the container.
It is considered to be used in CI. Before pushing to a container registry, you can scan your local container image easily.
See [here](#continuous-integration-ci) for details.
@@ -76,7 +76,7 @@ See [here](#continuous-integration-ci) for details.
- Specify only an image name
- See [Quick Start](#quick-start) and [Examples](#examples)
- Easy installation
- `apt-get install`, `yum install` and `brew install` is possible (See [Installation](#installation))
- `apt-get install`, `yum install` and `brew install` are all possible (See [Installation](#installation))
- **No need for prerequirements** such as installation of DB, libraries, etc. (The exception is that you need `rpm` installed to scan images based on RHEL/CentOS. This is automatically included if you use our installers or the Trivy container image. See [Vulnerability Detection](#vulnerability-detection) for background information.)
- High accuracy
- **Especially Alpine Linux and RHEL/CentOS**
@@ -169,7 +169,7 @@ You also need to install `rpm` command for scanning images based on RHEL/CentOS.
# Quick Start
Simply specify an image name (and a tag). **The `latest` tag should be avoided as problems occur with cache.**. See [Clear image caches](#clear-image-caches).
Simply specify an image name (and a tag). **The `latest` tag should be avoided as problems occur with the image cache.** See [Clear image caches](#clear-image-caches).
## Basic