39
39
run : |
40
40
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .
41
41
- name : Run Trivy vulnerability scanner
42
- uses : aquasecurity/trivy-action@master
42
+ uses : aquasecurity/trivy-action@0.20.0
43
43
with :
44
44
image-ref : ' docker.io/my-organization/my-app:${{ github.sha }}'
45
45
format : ' table'
67
67
uses : actions/checkout@v3
68
68
69
69
- name : Run Trivy vulnerability scanner in fs mode
70
- uses : aquasecurity/trivy-action@master
70
+ uses : aquasecurity/trivy-action@0.20.0
71
71
with :
72
72
scan-type : ' fs'
73
73
scan-ref : ' .'
@@ -117,7 +117,7 @@ jobs:
117
117
docker save -o vuln-image.tar <your-docker-image>
118
118
119
119
- name: Run Trivy vulnerability scanner in tarball mode
120
- uses: aquasecurity/trivy-action@master
120
+ uses: aquasecurity/trivy-action@0.20.0
121
121
with:
122
122
input: /github/workspace/vuln-image.tar
123
123
severity: 'CRITICAL,HIGH'
@@ -145,7 +145,7 @@ jobs:
145
145
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .
146
146
147
147
- name: Run Trivy vulnerability scanner
148
- uses: aquasecurity/trivy-action@master
148
+ uses: aquasecurity/trivy-action@0.20.0
149
149
with:
150
150
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
151
151
format: 'sarif'
@@ -180,7 +180,7 @@ jobs:
180
180
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .
181
181
182
182
- name: Run Trivy vulnerability scanner
183
- uses: aquasecurity/trivy-action@master
183
+ uses: aquasecurity/trivy-action@0.20.0
184
184
with:
185
185
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
186
186
format: 'sarif'
@@ -215,7 +215,7 @@ jobs:
215
215
uses: actions/checkout@v3
216
216
217
217
- name: Run Trivy vulnerability scanner in repo mode
218
- uses: aquasecurity/trivy-action@master
218
+ uses: aquasecurity/trivy-action@0.20.0
219
219
with:
220
220
scan-type: 'fs'
221
221
ignore-unfixed: true
@@ -249,7 +249,7 @@ jobs:
249
249
uses: actions/checkout@v3
250
250
251
251
- name: Run Trivy vulnerability scanner with rootfs command
252
- uses: aquasecurity/trivy-action@master
252
+ uses: aquasecurity/trivy-action@0.20.0
253
253
with:
254
254
scan-type: 'rootfs'
255
255
scan-ref: 'rootfs-example-binary'
@@ -284,7 +284,7 @@ jobs:
284
284
uses: actions/checkout@v3
285
285
286
286
- name: Run Trivy vulnerability scanner in IaC mode
287
- uses: aquasecurity/trivy-action@master
287
+ uses: aquasecurity/trivy-action@0.20.0
288
288
with:
289
289
scan-type: 'config'
290
290
hide-progress: true
@@ -328,7 +328,7 @@ jobs:
328
328
uses: actions/checkout@v3
329
329
330
330
- name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph
331
- uses: aquasecurity/trivy-action@master
331
+ uses: aquasecurity/trivy-action@0.20.0
332
332
with:
333
333
scan-type: 'fs'
334
334
format: 'github'
@@ -359,7 +359,7 @@ jobs:
359
359
runs-on: ubuntu-20.04
360
360
steps:
361
361
- name: Scan image in a private registry
362
- uses: aquasecurity/trivy-action@master
362
+ uses: aquasecurity/trivy-action@0.20.0
363
363
with:
364
364
image-ref: "private_image_registry/image_name:image_tag"
365
365
scan-type: image
@@ -402,7 +402,7 @@ jobs:
402
402
uses: actions/checkout@v3
403
403
404
404
- name: Run Trivy vulnerability scanner
405
- uses: aquasecurity/trivy-action@master
405
+ uses: aquasecurity/trivy-action@0.20.0
406
406
with:
407
407
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
408
408
format: 'sarif'
@@ -438,7 +438,7 @@ jobs:
438
438
uses: actions/checkout@v3
439
439
440
440
- name: Run Trivy vulnerability scanner
441
- uses: aquasecurity/trivy-action@master
441
+ uses: aquasecurity/trivy-action@0.20.0
442
442
with:
443
443
image-ref: 'aws_account_id.dkr.ecr.region.amazonaws.com/imageName:${{ github.sha }}'
444
444
format: 'sarif'
@@ -474,7 +474,7 @@ jobs:
474
474
uses: actions/checkout@v3
475
475
476
476
- name: Run Trivy vulnerability scanner
477
- uses: aquasecurity/trivy-action@master
477
+ uses: aquasecurity/trivy-action@0.20.0
478
478
with:
479
479
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
480
480
format: 'sarif'
@@ -507,7 +507,7 @@ jobs:
507
507
uses: actions/checkout@v3
508
508
509
509
- name: Run Trivy vulnerability scanner
510
- uses: aquasecurity/trivy-action@master
510
+ uses: aquasecurity/trivy-action@0.20.0
511
511
with:
512
512
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
513
513
format: 'sarif'
@@ -530,7 +530,7 @@ This step is especially useful for private repositories without [GitHub Advanced
530
530
531
531
` ` ` yaml
532
532
- name: Run Trivy scanner
533
- uses: aquasecurity/trivy-action@master
533
+ uses: aquasecurity/trivy-action@0.20.0
534
534
with:
535
535
scan-type: config
536
536
hide-progress: true
0 commit comments