36
36
TRIVY_PASSWORD : ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }}
37
37
38
38
- name : Upload Trivy scan results to GitHub Security tab
39
- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
39
+ uses : github/codeql-action/upload-sarif@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
40
40
with :
41
41
sarif_file : ' trivy-results.sarif'
42
42
category : ${{ github.jobs[github.job].name }}
@@ -60,15 +60,15 @@ jobs:
60
60
password : ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }}
61
61
62
62
- name : Run the Anchore Grype scan action
63
- uses : anchore/scan-action@16910ac423301c6d30554b83a7f71ac6ff4a51f3
63
+ uses : anchore/scan-action@df395807f4554463d4455b8047cf58e37b6acaae
64
64
id : grype
65
65
with :
66
66
image : ' ${{ vars.GREENBONE_REGISTRY }}/opensight/opensight-postgres:16'
67
67
fail-build : false
68
68
severity-cutoff : medium
69
69
70
70
- name : Upload grype vulnerability report
71
- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
71
+ uses : github/codeql-action/upload-sarif@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
72
72
with :
73
73
sarif_file : ${{ steps.grype.outputs.sarif }}
74
74
category : ${{ github.jobs[github.job].name }}
@@ -108,7 +108,7 @@ jobs:
108
108
- name : Upload docker scout SARIF result
109
109
id : upload-sarif
110
110
if : ${{ github.event_name != 'pull_request_target' }}
111
- uses : github/codeql-action/upload-sarif@181d5eefc20863364f96762470ba6f862bdef56b # v3.29.2
111
+ uses : github/codeql-action/upload-sarif@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
112
112
with :
113
113
sarif_file : sarif.output.json
114
114
category : ${{ github.jobs[github.job].name }}
0 commit comments