Skip to content

Releases: aws-actions/vulnerability-scan-github-action-for-amazon-inspector

v1.2.0

26 Nov 18:41
8c2d4d7
Compare
Choose a tag to compare

This release adds support for scanning multi-arch container images.

To use this feature, specify the OS and CPU platform matching the image you wish to scan by adding the platform argument to your workflows, as shown below:

      - name: Scan built image with Inspector
        uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
        id: inspector
        with:
          artifact_type: 'container'
          artifact_path: 'alpine:latest'
          ...
          platform: "linux/arm64/v8"
          sbomgen_version: "latest"

If platform is unspecified, this action will default to the OS/CPU platform that matches the GitHub Actions runner.

⚠️ This workflow requires inspector-sbomgen versions greater than or equal to 1.5.2.

v1.1.5

26 Nov 18:58
8c2d4d7
Compare
Choose a tag to compare

Improved handling of Inspector reports (CSV, JSON, Markdown) when no vulnerabilities were found.

v1.1.4

06 Sep 15:36
d771038
Compare
Choose a tag to compare
  • This release fixes an issue that caused the example workflow to fail when no vulnerabilities were detected (see issue 85 and PR #86).

  • Minor improvements to the Dockerfile markdown report (#92, #93, #94)

v1.1.3

30 Jul 14:21
a3574ba
Compare
Choose a tag to compare

This patch release improves parsing and rendering of the Inspector vulnerability summary report (#72, #75, #77, #78):

  • Added new column Source which denotes the vendor that provided the vulnerability severity, such as NVD, MITRE, or Amazon Inspector.
  • Resolved issue that was causing vulnerability severity to be empty when the severity was provided by a source other than NVD.

v1.1.2

27 Jun 20:03
016a421
Compare
Choose a tag to compare

Resolves an issue that prevented the action from executing on aarch64 systems. #62

v1.1.1

17 Jun 15:31
Compare
Choose a tag to compare

The vulnerability step summary is now displayed when zero vulnerabilities are present. #60

v1.1.0

04 Jun 17:35
ecf6e39
Compare
Choose a tag to compare

This release adds support for a new vulnerability finding type: Dockerfile security configuration issues.

This action will scan stand alone Dockerfiles in your project, archive, or container image for vulnerabilities.

Additionally, this action will scan an image's build history for security issues.

Release version 1.0.0

29 Apr 15:45
f7ebfdd
Compare
Choose a tag to compare

Vulnerability Scan GitHub Action for Amazon Inspector

Amazon Inspector is a vulnerability management service that scans AWS workloads
and CycloneDX SBOMs for known software vulnerabilities.

This GitHub Action allows you to scan supported artifacts for software vulnerabilities using Amazon Inspector from your
GitHub Actions workflows.

An active AWS account is required to use this action.