docs/guide/supply-chain/vex/index.md
!!! warning "EXPERIMENTAL" This feature might change without preserving backwards compatibility.
Trivy supports filtering detected vulnerabilities using the Vulnerability Exploitability eXchange (VEX), a standardized format for sharing and exchanging information about vulnerabilities. By providing VEX during scanning, it is possible to filter vulnerabilities based on their status.
Trivy currently supports four methods for utilizing VEX:
To enable VEX, use the --vex option.
You can specify the method to use:
--vex repo--vex /path/to/vex-document.json--vex oci--vex sbom-ref$ trivy image ghcr.io/aquasecurity/trivy:0.52.0 --vex repo
You can enable these methods simultaneously. The order of specification determines the priority:
--vex repo --vex /path/to/vex-document.json: VEX Repository has priority--vex /path/to/vex-document.json --vex repo: Local file has priorityFor detailed information on each method, please refer to each page.