diff --git a/.github/workflows/scan-with-trivy-config-only.yml b/.github/workflows/scan-with-trivy-config-only.yml index c319b15..c489c6f 100644 --- a/.github/workflows/scan-with-trivy-config-only.yml +++ b/.github/workflows/scan-with-trivy-config-only.yml @@ -14,7 +14,7 @@ jobs: uses: actions/checkout@v4 - name: Trivy Misconfiguration - IaC - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: scan-type: config hide-progress: false diff --git a/.github/workflows/scan-with-trivy-pr-config-only.yml b/.github/workflows/scan-with-trivy-pr-config-only.yml index e79e8c8..e6f1910 100644 --- a/.github/workflows/scan-with-trivy-pr-config-only.yml +++ b/.github/workflows/scan-with-trivy-pr-config-only.yml @@ -14,7 +14,7 @@ jobs: uses: actions/checkout@v4 - name: Trivy Misconfiguration - IaC - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: scan-type: config severity: CRITICAL,HIGH,MEDIUM diff --git a/.github/workflows/scan-with-trivy-pr.yml b/.github/workflows/scan-with-trivy-pr.yml index bd8984c..4977a15 100644 --- a/.github/workflows/scan-with-trivy-pr.yml +++ b/.github/workflows/scan-with-trivy-pr.yml @@ -23,7 +23,7 @@ jobs: docker build -t docker.io/${{ steps.string.outputs.lowercase }}:${{ github.sha }} . - name: Run Trivy image vulnerability scanner - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: image-ref: 'docker.io/${{ steps.string.outputs.lowercase }}:${{ github.sha }}' scan-type: image @@ -56,7 +56,7 @@ jobs: uses: actions/checkout@v4 - name: Trivy Misconfiguration - IaC - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: scan-type: config severity: CRITICAL,HIGH,MEDIUM diff --git a/.github/workflows/scan-with-trivy.yml b/.github/workflows/scan-with-trivy.yml index c90adcb..4c5a43f 100644 --- a/.github/workflows/scan-with-trivy.yml +++ b/.github/workflows/scan-with-trivy.yml @@ -20,7 +20,7 @@ jobs: docker build -t docker.io/${{ steps.string.outputs.lowercase }}:${{ github.sha }} . - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: image-ref: 'docker.io/${{ steps.string.outputs.lowercase }}:${{ github.sha }}' scan-type: image @@ -39,7 +39,7 @@ jobs: category: 'Trivy Image Vulnerability' - name: Trivy Misconfiguration - IaC - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: scan-type: config severity: CRITICAL,HIGH,MEDIUM @@ -62,7 +62,7 @@ jobs: uses: actions/checkout@v4 - name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: scan-type: 'fs' format: 'github'