diff --git a/.github/workflows/pr-security-scan.yml b/.github/workflows/pr-security-scan.yml index 4953a8b7..a846405d 100644 --- a/.github/workflows/pr-security-scan.yml +++ b/.github/workflows/pr-security-scan.yml @@ -138,7 +138,7 @@ jobs: # ----------------- Security Scans ----------------- - name: Trivy Secret Scan - Component (Table Output) - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.35.0 if: always() with: scan-type: fs @@ -150,7 +150,7 @@ jobs: version: 'v0.69.2' - name: Trivy Secret Scan - Component (SARIF Output) - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.35.0 if: always() with: scan-type: fs @@ -178,7 +178,7 @@ jobs: - name: Trivy Vulnerability Scan - Docker Image (Table Output) if: always() && inputs.enable_docker_scan - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.35.0 with: image-ref: '${{ env.DOCKERHUB_ORG }}/${{ env.APP_NAME }}:pr-scan-${{ github.sha }}' format: 'table' @@ -190,7 +190,7 @@ jobs: - name: Trivy Vulnerability Scan - Docker Image (SARIF Output) if: always() && inputs.enable_docker_scan - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.35.0 with: image-ref: '${{ env.DOCKERHUB_ORG }}/${{ env.APP_NAME }}:pr-scan-${{ github.sha }}' format: sarif @@ -204,7 +204,7 @@ jobs: # ----------------- Filesystem Vulnerability Scan ----------------- - name: Trivy Vulnerability Scan - Filesystem (JSON Output) id: fs-vuln-scan - uses: aquasecurity/trivy-action@0.34.1 + uses: aquasecurity/trivy-action@0.35.0 if: always() with: scan-type: fs