Skip to content
This repository was archived by the owner on Apr 1, 2026. It is now read-only.

Merge pull request #1053 from enechange/fix/renovate-supply-chain-har… #559

Merge pull request #1053 from enechange/fix/renovate-supply-chain-har…

Merge pull request #1053 from enechange/fix/renovate-supply-chain-har… #559

Workflow file for this run

name: Trivy
on:
push:
branches: [main]
schedule:
- cron: '0 0 * * *'
workflow_dispatch:
permissions:
contents: read
jobs:
scan:
runs-on: ubuntu-latest
timeout-minutes: 10
environment: production
permissions:
contents: read
security-events: write
steps:
- name: Checkout code
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
with:
persist-credentials: false
- name: Login to Docker Hardened Images
uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 # v4.0.0
with:
registry: dhi.io
username: ${{ secrets.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
- name: Build Docker image
run: |
docker build -t trivy-scan:${{ github.sha }} .
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0
with:
image-ref: trivy-scan:${{ github.sha }}
format: 'sarif'
output: 'trivy-results.sarif'
scanners: 'vuln'
version: 'v0.68.2'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@38697555549f1db7851b81482ff19f1fa5c4fedc # v4.34.1
if: always()
with:
sarif_file: 'trivy-results.sarif'