Skip to content

chore(deps): bump actions/attest-build-provenance (#14) #73

chore(deps): bump actions/attest-build-provenance (#14)

chore(deps): bump actions/attest-build-provenance (#14) #73

Workflow file for this run

name: Scan IaC Configs for Vulnerabilities
on:
push:
branches: ["main"]
pull_request:
jobs:
configs:
permissions:
contents: read # To checkout and read repository
security-events: write # To upload to security tab
name: Scan Configs
runs-on: ubuntu-latest
steps:
- name: Checkout Code
uses: actions/[email protected]
- name: Run Trivy Vulnerability Scanner in IaC Mode
uses: aquasecurity/[email protected]
with:
scan-type: "config"
hide-progress: true
format: "sarif"
output: "trivy-results.sarif"
exit-code: "1"
severity: "CRITICAL,HIGH,MEDIUM"
# NOTE: By default SARIF format enforces output of
# all vulnerabilities regardless of configured severities.
limit-severities-for-sarif: true
- name: Upload Trivy Scan Results to GitHub Security Tab
if: always()
uses: github/codeql-action/[email protected]
with:
sarif_file: "trivy-results.sarif"
category: "IaC-Config"