This repository was archived by the owner on Apr 8, 2025. It is now read-only.
File tree 1 file changed +30
-0
lines changed
1 file changed +30
-0
lines changed Original file line number Diff line number Diff line change 52
52
uses : github/codeql-action/upload-sarif@012739e5082ff0c22ca6d6ab32e07c36df03c4a4 # v3.22.12
53
53
with :
54
54
sarif_file : ' trivy-results.sarif'
55
+
56
+ # - name: Run Trivy vulnerability scanner in repo mode
57
+ # uses: aquasecurity/trivy-action@master
58
+ # id: fs_trivy
59
+ # with:
60
+ # scan-type: 'fs'
61
+ # format: 'github' #table
62
+ # output: './trivy_config.txt'
63
+ # # severity: 'CRITICAL,HIGH'
64
+
65
+ - name : Trivy Generate Reports
66
+ run : |
67
+ wget -q https://github.com/aquasecurity/trivy/releases/download/v0.48.2/trivy_0.48.2_Linux-64bit.deb
68
+ sudo apt install -y ./*.deb
69
+ echo "trivy fs -d ." |tee ./trivy_fs_scan.txt
70
+ trivy fs -d . &> ./trivy_fs_scan.txt
71
+ echo "trivy config -s HIGH,CRITICAL . -d" |tee ./trivy_config_scan.txt
72
+ trivy config -s HIGH,CRITICAL -d . &> ./trivy_config_scan.txt
73
+ echo "trivy image userspacecni:latest -s HIGH,CRITICAL" > ./trivy_image_scan.txt
74
+ trivy image userspacecni:latest -s HIGH,CRITICAL &> ./trivy_image_scan.txt
75
+
76
+
77
+ - name : GitHub Upload Trivy Reports
78
+ uses : actions/upload-artifact@c7d193f32edcb7bfad88892161225aeda64e9392 # v4.0.0
79
+ with :
80
+ name : trivy_reports
81
+ path : |
82
+ ./trivy_fs_scan.txt
83
+ ./trivy_config_scan.txt
84
+ ./trivy_image_scan.txt
You can’t perform that action at this time.
0 commit comments