diff --git a/security-actions/scan-docker-image/action.yml b/security-actions/scan-docker-image/action.yml index cde5624b..5618340e 100644 --- a/security-actions/scan-docker-image/action.yml +++ b/security-actions/scan-docker-image/action.yml @@ -139,7 +139,7 @@ runs: fail: true - name: Download Grype - uses: anchore/scan-action/download-grype@v4.1.2 + uses: anchore/scan-action/download-grype@v5.0.1 # Skip Cache Restoration: If skip_grype_db_cache is true, skip the restoration of the cache. # Check for any existing cache to reuse @@ -217,7 +217,7 @@ runs: # Grype is invoked first time ever # Don't fail during report generation - name: Vulnerability analysis of SBOM - uses: anchore/scan-action@v4.1.2 + uses: anchore/scan-action@v5.0.1 id: grype_analysis_sarif if: ${{ steps.sbom_report.outputs.files_exists == 'true' && steps.grype_db_check_updates.outputs.GRYPE_DB_UPDATE_STATUS == 0 }} with: @@ -232,7 +232,7 @@ runs: # Don't fail during report generation # JSON format will report any ignored rules - name: Vulnerability analysis of SBOM - uses: anchore/scan-action@v4.1.2 + uses: anchore/scan-action@v5.0.1 id: grype_analysis_json if: ${{ steps.sbom_report.outputs.files_exists == 'true' && steps.grype_db_check_updates.outputs.GRYPE_DB_UPDATE_STATUS == 0 }} with: @@ -284,7 +284,7 @@ runs: # Notify grype quick scan results in table format # Table format will supress any specified ignore rules - name: Inspect Vulnerability analysis of SBOM - uses: anchore/scan-action@v4.1.2 + uses: anchore/scan-action@v5.0.1 if: ${{ steps.sbom_report.outputs.files_exists == 'true' && steps.grype_db_check_updates.outputs.GRYPE_DB_UPDATE_STATUS == 0 }} with: sbom: ${{ steps.meta.outputs.sbom_spdx_file }}