Skip to content

Commit 814fe5e

Browse files
committed
fix: update trivy-action to v0.35.0 (post-compromise safe SHA) and pin trivy v0.69.3
The v0.33.1 SHA (b6643a29) was in the compromised range from the March 19 supply chain attack. Updated to v0.35.0 (57a97c7e) which is the verified safe release. Pinned trivy binary to v0.69.3 to avoid 'missing release artifacts' failures on auto-detected versions.
1 parent 798ae44 commit 814fe5e

1 file changed

Lines changed: 4 additions & 2 deletions

File tree

.github/workflows/docker-build-push.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -168,23 +168,25 @@ jobs:
168168

169169
- name: Run Trivy vulnerability scanner (table output)
170170
if: inputs.scan
171-
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1
171+
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
172172
with:
173173
image-ref: ${{ inputs.registry }}/${{ github.repository_owner }}/${{ inputs.image }}@${{ steps.build.outputs.digest }}
174174
format: 'table'
175175
severity: ${{ inputs.severity }}
176176
timeout: '10m'
177177
exit-code: '0' # Don't fail on vulnerabilities, just report
178+
version: 'v0.69.3'
178179

179180
- name: Run Trivy vulnerability scanner (SARIF output)
180181
if: inputs.scan && inputs.upload-sarif
181-
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1
182+
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
182183
with:
183184
image-ref: ${{ inputs.registry }}/${{ github.repository_owner }}/${{ inputs.image }}@${{ steps.build.outputs.digest }}
184185
format: 'sarif'
185186
output: 'trivy-results.sarif'
186187
severity: ${{ inputs.severity }}
187188
timeout: '10m'
189+
version: 'v0.69.3'
188190

189191
- name: Upload Trivy scan results to GitHub Security
190192
if: inputs.scan && inputs.upload-sarif

0 commit comments

Comments
 (0)