Browse Source
			
			
			
			
				
		* ci: add trivy workflow to ensure critical and high vulnerabilties are detected quickly * push trivy-action to 0.13.1pull/4030/head
							committed by
							
								 GitHub
								GitHub
							
						
					
				
				 1 changed files with 43 additions and 0 deletions
			
			
		| @ -0,0 +1,43 @@ | |||
| name: trivy | |||
| 
 | |||
| on: | |||
|   push: | |||
|     branches: | |||
|       - main | |||
|       - release-build-revision | |||
|     tags: | |||
|       - '*' | |||
|   pull_request: | |||
|     branches: [ "main" ] | |||
|   schedule: | |||
|     - cron: '00 12 * * *' | |||
| 
 | |||
| permissions: | |||
|   contents: read | |||
| 
 | |||
| jobs: | |||
|   trivy-scan: | |||
|     name: Check | |||
|     runs-on: ubuntu-22.04 | |||
|     timeout-minutes: 30 | |||
|     permissions: | |||
|       contents: read | |||
|       security-events: write | |||
|       actions: read | |||
|     steps: | |||
|       - name: Checkout code | |||
|         uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 #v4.1.1 | |||
| 
 | |||
|       - name: Run Trivy vulnerability scanner | |||
|         uses: aquasecurity/trivy-action@f78e9ecf42a1271402d4f484518b9313235990e1 # v0.13.1 | |||
|         with: | |||
|           scan-type: repo | |||
|           ignore-unfixed: true | |||
|           format: sarif | |||
|           output: trivy-results.sarif | |||
|           severity: CRITICAL,HIGH | |||
| 
 | |||
|       - name: Upload Trivy scan results to GitHub Security tab | |||
|         uses: github/codeql-action/upload-sarif@bad341350a2f5616f9e048e51360cedc49181ce8 # v2.22.4 | |||
|         with: | |||
|           sarif_file: 'trivy-results.sarif' | |||
					Loading…
					
					
				
		Reference in new issue