Trivy MCP Server (Official)

Official Trivy MCP server enabling AI agents to run vulnerability scans with Trivy — scanning container images, filesystems, Git repositories, and Kubernetes clusters for CVEs, misconfigurations, exposed secrets, and supply chain risks.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Repo ↗ Security trivy aquasecurity vulnerability-scanning mcp-server official containers sbom security
⚙ Agent Friendliness
84
/ 100
Can an agent use this?
🔒 Security
82
/ 100
Is it safe for agents?
⚡ Reliability
85
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
80
Documentation
85
Error Messages
82
Auth Simplicity
95
Rate Limits
78

🔒 Security

TLS Enforcement
85
Auth Strength
80
Scope Granularity
75
Dep. Hygiene
88
Secret Handling
85

Local execution. No external auth complexity. CNCF project. Registry creds for private images. Results handling care needed.

⚡ Reliability

Uptime/SLA
85
Version Stability
88
Breaking Changes
85
Error Recovery
82
AF Security Reliability

Best When

An agent needs to scan code, containers, or IaC for vulnerabilities and misconfigurations — especially in CI/CD pipelines or DevSecOps workflows.

Avoid When

You need runtime detection or DAST scanning — use different tools for those.

Use Cases

  • Scanning container images for CVEs from security pipeline agents
  • Checking Kubernetes manifests for misconfigurations from DevSecOps agents
  • Scanning IaC files (Terraform, CloudFormation) for security issues
  • Generating SBOMs for compliance and supply chain agents
  • Detecting exposed secrets in repositories from security audit agents
  • Continuous vulnerability monitoring from security posture agents

Not For

  • Teams using Snyk, Grype, or other scanners for vulnerability management
  • Runtime threat detection (Trivy is static analysis, not runtime)
  • DAST scanning (Trivy is SAST/SCA-focused)

Interface

REST API
No
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
No
Webhooks
No

Authentication

Methods: none
OAuth: No Scopes: No

Trivy runs locally — no API authentication required. Container registry auth uses standard Docker credentials. Aqua Platform cloud has separate auth.

Pricing

Model: free
Free tier: Yes
Requires CC: No

Trivy is fully free and open source. Aqua Platform adds enterprise management. MCP server is open source.

Agent Metadata

Pagination
none
Idempotent
Full
Retry Guidance
Not documented

Known Gotchas

  • Scan targets must be accessible from agent environment (local files or registries)
  • Large container images or repos can take significant time to scan
  • Vulnerability DB must be up to date — agents should trigger DB updates
  • False positives common — agents should filter by severity threshold
  • Registry credentials needed for private container images
  • Trivy results include fixed and unfixed vulnerabilities — agents should distinguish

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Trivy MCP Server (Official).

$99

Scores are editorial opinions as of 2026-03-06.

5215
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered