diff --git a/.github/workflows/build-containers.yml b/.github/workflows/build-containers.yml index 820cc8d..aaf4081 100644 --- a/.github/workflows/build-containers.yml +++ b/.github/workflows/build-containers.yml @@ -478,7 +478,7 @@ jobs: rm -f /tmp/security-attestation.json - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.34.0 + uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 with: image-ref: local-scan:${{ steps.meta.outputs.server_name }}-${{ steps.meta.outputs.version }} format: 'sarif' diff --git a/.github/workflows/periodic-security-scan.yml b/.github/workflows/periodic-security-scan.yml index 695bbe8..9bc02cd 100644 --- a/.github/workflows/periodic-security-scan.yml +++ b/.github/workflows/periodic-security-scan.yml @@ -82,7 +82,7 @@ jobs: password: ${{ secrets.GITHUB_TOKEN }} - name: Run Trivy comprehensive scan - uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.34.0 + uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 with: image-ref: ${{ steps.meta.outputs.image_ref }} format: 'sarif' @@ -99,7 +99,7 @@ jobs: category: 'periodic-trivy-${{ steps.meta.outputs.server_name }}' - name: Run Trivy for detailed JSON report - uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.34.0 + uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 with: image-ref: ${{ steps.meta.outputs.image_ref }} format: 'json'