@@ -30,10 +30,10 @@ jobs:
30
30
runs-on : ubuntu-22.04
31
31
steps :
32
32
- name : Checkout
33
- uses : actions/checkout@v4
33
+ uses : actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4
34
34
35
35
- name : Run Trivy in config mode for deployments
36
- uses : aquasecurity/trivy-action@master
36
+ uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # 0.20.0
37
37
with :
38
38
scan-type : config
39
39
scan-ref : deployments/
@@ -49,10 +49,10 @@ jobs:
49
49
runs-on : ubuntu-22.04
50
50
steps :
51
51
- name : Checkout
52
- uses : actions/checkout@v4
52
+ uses : actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4
53
53
54
54
- name : Run Trivy in config mode for dockerfiles
55
- uses : aquasecurity/trivy-action@master
55
+ uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # 0.20.0
56
56
with :
57
57
scan-type : config
58
58
scan-ref : build/docker/
@@ -64,10 +64,10 @@ jobs:
64
64
name : Scan licenses
65
65
steps :
66
66
- name : Checkout
67
- uses : actions/checkout@v4
67
+ uses : actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4
68
68
69
69
- name : Run Trivy in fs mode
70
- uses : aquasecurity/trivy-action@master
70
+ uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # 0.20.0
71
71
with :
72
72
scan-type : fs
73
73
scan-ref : .
@@ -83,11 +83,11 @@ jobs:
83
83
name : Scan vulnerabilities
84
84
steps :
85
85
- name : Checkout
86
- uses : actions/checkout@v4
86
+ uses : actions/checkout@a5ac7e51b41094c92402da3b24376905380afc29 # v4
87
87
88
88
- name : Run Trivy in fs mode
89
89
continue-on-error : true
90
- uses : aquasecurity/trivy-action@master
90
+ uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # 0.20.0
91
91
with :
92
92
scan-type : fs
93
93
scan-ref : .
97
97
output : trivy-report.json
98
98
99
99
- name : Show report in human-readable format
100
- uses : aquasecurity/trivy-action@master
100
+ uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # 0.20.0
101
101
with :
102
102
scan-type : convert
103
103
vuln-type : ' '
@@ -107,7 +107,7 @@ jobs:
107
107
108
108
- name : Convert report to sarif
109
109
if : ${{ inputs.upload-to-github-security-tab }}
110
- uses : aquasecurity/trivy-action@master
110
+ uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # 0.20.0
111
111
with :
112
112
scan-type : convert
113
113
vuln-type : ' '
@@ -118,13 +118,13 @@ jobs:
118
118
119
119
- name : Upload sarif report to GitHub Security tab
120
120
if : ${{ inputs.upload-to-github-security-tab }}
121
- uses : github/codeql-action/upload-sarif@v3
121
+ uses : github/codeql-action/upload-sarif@187e591bef188a41dd329c95d7905134173654ae # v3
122
122
with :
123
123
sarif_file : trivy-report.sarif
124
124
125
125
- name : Convert report to csv
126
126
if : ${{ inputs.export-csv }}
127
- uses : aquasecurity/trivy-action@master
127
+ uses : aquasecurity/trivy-action@b2933f565dbc598b29947660e66259e3c7bc8561 # 0.20.0
128
128
with :
129
129
scan-type : convert
130
130
vuln-type : ' '
@@ -136,7 +136,7 @@ jobs:
136
136
137
137
- name : Upload CSV report as an artifact
138
138
if : ${{ inputs.export-csv }}
139
- uses : actions/upload-artifact@v4
139
+ uses : actions/upload-artifact@65462800fd760344b1a7b4382951275a0abb4808 # v4
140
140
with :
141
141
name : trivy-report
142
142
path : trivy-report.csv
0 commit comments