diff --git a/.github/workflows/pipeline.yml b/.github/workflows/pipeline.yml index 085785a..7229a9d 100644 --- a/.github/workflows/pipeline.yml +++ b/.github/workflows/pipeline.yml @@ -86,7 +86,7 @@ jobs: - name: Run Trivy vulnerability scanner # Third-party action, pin to commit SHA! # See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions - uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 + uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d with: image-ref: ${{ env.CONTAINER_REGISTRY }}/${{ env.CONTAINER_IMAGE_NAME }}:${{ env.CONTAINER_IMAGE_VERSION }} format: "sarif" @@ -99,7 +99,7 @@ jobs: - name: Generate cosign vulnerability scan record # Third-party action, pin to commit SHA! # See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions - uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 + uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d with: image-ref: ${{ env.CONTAINER_REGISTRY }}/${{ env.CONTAINER_IMAGE_NAME }}:${{ env.CONTAINER_IMAGE_VERSION }} format: "cosign-vuln" diff --git a/.github/workflows/scan.yml b/.github/workflows/scan.yml index 9f9d41f..97acba4 100644 --- a/.github/workflows/scan.yml +++ b/.github/workflows/scan.yml @@ -16,21 +16,21 @@ jobs: runs-on: ubuntu-latest steps: - name: Remove all caches and database of the trivy scanner - uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 + uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d env: TRIVY_RESET: true TRIVY_DEBUG: true with: scan-type: "image" - name: Download trivy vulnerabilities DB - uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 + uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d env: TRIVY_DEBUG: true TRIVY_DOWNLOAD_DB_ONLY: true with: scan-type: "image" - name: Download trivy Java index DB - uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 + uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d env: TRIVY_DEBUG: true TRIVY_DOWNLOAD_JAVA_DB_ONLY: true @@ -49,7 +49,7 @@ jobs: - name: Run Trivy vulnerability scanner # Third-party action, pin to commit SHA! # See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions - uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 + uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d env: TRIVY_USERNAME: ${{ github.actor }} TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }} @@ -75,7 +75,7 @@ jobs: - name: Generate cosign vulnerability scan record # Third-party action, pin to commit SHA! # See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions - uses: aquasecurity/trivy-action@fd25fed6972e341ff0007ddb61f77e88103953c2 + uses: aquasecurity/trivy-action@595be6a0f6560a0a8fc419ddf630567fc623531d env: TRIVY_USERNAME: ${{ github.actor }} TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }}