diff --git a/.github/workflows/scan-with-trivy-config-only.yml b/.github/workflows/scan-with-trivy-config-only.yml index 0c3036f..4ea2d6a 100644 --- a/.github/workflows/scan-with-trivy-config-only.yml +++ b/.github/workflows/scan-with-trivy-config-only.yml @@ -14,7 +14,7 @@ jobs: uses: actions/checkout@v4 - name: Trivy Misconfiguration - IaC - uses: aquasecurity/trivy-action@0.17.0 + uses: aquasecurity/trivy-action@0.19.0 with: scan-type: config hide-progress: false diff --git a/.github/workflows/scan-with-trivy-pr-config-only.yml b/.github/workflows/scan-with-trivy-pr-config-only.yml index 0eb6a8d..4437bb3 100644 --- a/.github/workflows/scan-with-trivy-pr-config-only.yml +++ b/.github/workflows/scan-with-trivy-pr-config-only.yml @@ -14,7 +14,7 @@ jobs: uses: actions/checkout@v4 - name: Trivy Misconfiguration - IaC - uses: aquasecurity/trivy-action@0.17.0 + uses: aquasecurity/trivy-action@0.19.0 with: scan-type: config severity: CRITICAL,HIGH,MEDIUM diff --git a/.github/workflows/scan-with-trivy-pr.yml b/.github/workflows/scan-with-trivy-pr.yml index 16b9642..669ccd0 100644 --- a/.github/workflows/scan-with-trivy-pr.yml +++ b/.github/workflows/scan-with-trivy-pr.yml @@ -23,7 +23,7 @@ jobs: docker build -t docker.io/${{ steps.string.outputs.lowercase }}:${{ github.sha }} . - name: Run Trivy image vulnerability scanner - uses: aquasecurity/trivy-action@0.17.0 + uses: aquasecurity/trivy-action@0.19.0 with: image-ref: 'docker.io/${{ steps.string.outputs.lowercase }}:${{ github.sha }}' scan-type: image @@ -56,7 +56,7 @@ jobs: uses: actions/checkout@v4 - name: Trivy Misconfiguration - IaC - uses: aquasecurity/trivy-action@0.17.0 + uses: aquasecurity/trivy-action@0.19.0 with: scan-type: config severity: CRITICAL,HIGH,MEDIUM diff --git a/.github/workflows/scan-with-trivy.yml b/.github/workflows/scan-with-trivy.yml index 0515afd..560399b 100644 --- a/.github/workflows/scan-with-trivy.yml +++ b/.github/workflows/scan-with-trivy.yml @@ -20,7 +20,7 @@ jobs: docker build -t docker.io/${{ steps.string.outputs.lowercase }}:${{ github.sha }} . - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@0.17.0 + uses: aquasecurity/trivy-action@0.19.0 with: image-ref: 'docker.io/${{ steps.string.outputs.lowercase }}:${{ github.sha }}' scan-type: image @@ -39,7 +39,7 @@ jobs: category: 'Trivy Image Vulnerability' - name: Trivy Misconfiguration - IaC - uses: aquasecurity/trivy-action@0.17.0 + uses: aquasecurity/trivy-action@0.19.0 with: scan-type: config severity: CRITICAL,HIGH,MEDIUM @@ -62,7 +62,7 @@ jobs: uses: actions/checkout@v4 - name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph - uses: aquasecurity/trivy-action@0.17.0 + uses: aquasecurity/trivy-action@0.19.0 with: scan-type: 'fs' format: 'github'