diff --git a/.github/workflows/build-image.yml b/.github/workflows/build-image.yml index 76323633..2717e21d 100644 --- a/.github/workflows/build-image.yml +++ b/.github/workflows/build-image.yml @@ -257,7 +257,7 @@ jobs: - name: Run Trivy vulnerability scanner if: inputs.security_scan_enabled && inputs.security_scan_output_format != 'sarif' id: trivy-scan - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.34.2 with: version: v0.69.2 #remove this once fix is released https://github.com/aquasecurity/trivy-action/issues/517 skip-setup-trivy: true @@ -273,7 +273,7 @@ jobs: - name: Run Trivy vulnerability scanner sarif if: inputs.security_scan_enabled && inputs.security_scan_output_format == 'sarif' id: trivy-scan-sarif - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.34.2 with: version: v0.69.2 #remove this once fix is released https://github.com/aquasecurity/trivy-action/issues/517 skip-setup-trivy: true @@ -322,7 +322,7 @@ jobs: - name: Trivy vulnerability block Critical id: trivy-scan-block-critical if: inputs.security_scan_enabled - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.34.2 with: version: v0.69.2 #remove this once fix is released https://github.com/aquasecurity/trivy-action/issues/517 skip-setup-trivy: true diff --git a/.github/workflows/security_scan_repo.yml b/.github/workflows/security_scan_repo.yml index a518503c..78124be2 100644 --- a/.github/workflows/security_scan_repo.yml +++ b/.github/workflows/security_scan_repo.yml @@ -27,7 +27,7 @@ jobs: uses: actions/checkout@v6 - name: Security Scan FS - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.34.2 with: version: v0.69.2 #remove this once fix is released https://github.com/aquasecurity/trivy-action/issues/517 scan-type: "fs" @@ -35,7 +35,7 @@ jobs: output: "trivy-results-fs.sarif" - name: Security Scan Config - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.34.2 with: version: v0.69.2 #remove this once fix is released https://github.com/aquasecurity/trivy-action/issues/517 scan-type: "config"