diff --git a/.github/workflows/build-and-scan.yaml b/.github/workflows/build-and-scan.yaml index cb3dcc4..613828b 100644 --- a/.github/workflows/build-and-scan.yaml +++ b/.github/workflows/build-and-scan.yaml @@ -77,7 +77,7 @@ jobs: cache-to: type=gha,mode=max - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 + uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0 with: image-ref: '${{ fromJSON(steps.meta.outputs.json).tags[0] }}' format: 'sarif' diff --git a/.github/workflows/release.yaml b/.github/workflows/release.yaml index 3a0a529..9433e56 100644 --- a/.github/workflows/release.yaml +++ b/.github/workflows/release.yaml @@ -60,7 +60,7 @@ jobs: cache-to: type=gha,mode=max - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 + uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0 with: image-ref: 'ghcr.io/${{ github.repository }}@${{ steps.build.outputs.digest }}' format: 'sarif' @@ -76,7 +76,7 @@ jobs: sarif_file: 'trivy-results.sarif' - name: Run Trivy vulnerability scanner (Table output) - uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 + uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0 with: image-ref: 'ghcr.io/${{ github.repository }}@${{ steps.build.outputs.digest }}' format: 'table'