Skip to content

vulnerability scans #73

vulnerability scans

vulnerability scans #73

Triggered via schedule December 31, 2024 00:53
Status Cancelled
Total duration 1d 0h 5m 11s
Artifacts 3

vuln-scans.yml

on: schedule
Matrix: docker-otelcol
check-snyk-token
0s
check-snyk-token
binaries-windows_amd64
4m 33s
binaries-windows_amd64
trivy-fs-scan
11s
trivy-fs-scan
anchore-fs-scan
13s
anchore-fs-scan
govulncheck
3m 29s
govulncheck
Matrix: anchore-image-scan
Matrix: trivy-image-scan
snyk-fs-scan
0s
snyk-fs-scan
Matrix: snyk-docker-scan
Matrix: anchore-win-image-scan
Fit to window
Zoom out
Zoom in

Annotations

6 errors and 2 warnings
trivy-fs-scan
Process completed with exit code 1.
anchore-fs-scan
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
anchore-win-image-scan (windows-2019)
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
anchore-win-image-scan (windows-2022)
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
docker-otelcol (arm64, false)
Canceling since a higher priority waiting request for 'vuln-scans-refs/heads/main' exists
docker-otelcol (arm64, true)
Canceling since a higher priority waiting request for 'vuln-scans-refs/heads/main' exists
check-snyk-token
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
govulncheck
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636

Artifacts

Produced during runtime
Name Size
binaries-windows_amd64
224 MB
otelcol-amd64
459 MB
otelcol-amd64-fips
106 MB