Skip to content

Bump sqlparse from 0.4.3 to 0.5.0 in /rule-types/common/python_lock_file_exists.testdata/pipfile_lock #265

Bump sqlparse from 0.4.3 to 0.5.0 in /rule-types/common/python_lock_file_exists.testdata/pipfile_lock

Bump sqlparse from 0.4.3 to 0.5.0 in /rule-types/common/python_lock_file_exists.testdata/pipfile_lock #265

Workflow file for this run

name: Trivy Scan
on:
pull_request:
jobs:
trivy-code-security-scan:
runs-on: ubuntu-latest
name: Trivy
steps:
- name: Checkout
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4
- name: Security Scan
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
with:
scan-type: 'fs'
scanners: vuln,secret
exit-code: 1
ignore-unfixed: true
severity: 'CRITICAL'
skip-dirs: "./rule-types,./profiles,./data-sources"
env:
TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db
TRIVY_USERNAME: ${{ github.actor }}
TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }}