diff --git a/.github/workflows/pipeline.yml b/.github/workflows/pipeline.yml index 19b21c5..a7e0d84 100644 --- a/.github/workflows/pipeline.yml +++ b/.github/workflows/pipeline.yml @@ -104,7 +104,7 @@ jobs: - name: Run Trivy vulnerability scanner # Third-party action, pin to commit SHA! # See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions - uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f + uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 with: image-ref: ${{ env.CONTAINER_REGISTRY }}/${{ env.CONTAINER_IMAGE_NAME }}:${{ env.CONTAINER_IMAGE_VERSION }} format: "sarif" @@ -119,7 +119,7 @@ jobs: - name: Generate cosign vulnerability scan record # Third-party action, pin to commit SHA! # See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions - uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f + uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 with: image-ref: ${{ env.CONTAINER_REGISTRY }}/${{ env.CONTAINER_IMAGE_NAME }}:${{ env.CONTAINER_IMAGE_VERSION }} format: "cosign-vuln" diff --git a/.github/workflows/scan.yml b/.github/workflows/scan.yml index 5d99954..5c00e02 100644 --- a/.github/workflows/scan.yml +++ b/.github/workflows/scan.yml @@ -16,21 +16,21 @@ jobs: runs-on: ubuntu-latest steps: - name: Remove all caches and database of the trivy scanner - uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f + uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 env: TRIVY_RESET: true TRIVY_DEBUG: true with: scan-type: "image" - name: Download trivy vulnerabilities DB - uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f + uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 env: TRIVY_DEBUG: true TRIVY_DOWNLOAD_DB_ONLY: true with: scan-type: "image" - name: Download trivy Java index DB - uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f + uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 env: TRIVY_DEBUG: true TRIVY_DOWNLOAD_JAVA_DB_ONLY: true @@ -49,7 +49,7 @@ jobs: - name: Run Trivy vulnerability scanner # Third-party action, pin to commit SHA! # See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions - uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f + uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 env: TRIVY_USERNAME: ${{ github.actor }} TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }} @@ -68,7 +68,7 @@ jobs: - name: Generate cosign vulnerability scan record # Third-party action, pin to commit SHA! # See https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions - uses: aquasecurity/trivy-action@fbd16365eb88e12433951383f5e99bd901fc618f + uses: aquasecurity/trivy-action@b77b85c0254bba6789e787844f0585cde1e56320 env: TRIVY_USERNAME: ${{ github.actor }} TRIVY_PASSWORD: ${{ secrets.GITHUB_TOKEN }}