You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6-8Lines changed: 6 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,7 @@ If vulnerabilities are found by Trivy, it creates the following GitHub Issue.
11
11
12
12

13
13
14
-
## Usage
15
-
16
-
### Inputs
14
+
## Inputs
17
15
18
16
|Parameter|Required|Default Value|Description|
19
17
|:--:|:--:|:--:|:--|
@@ -22,21 +20,21 @@ If vulnerabilities are found by Trivy, it creates the following GitHub Issue.
22
20
|severity|False|HIGH,CRITICAL|Severities of vulnerabilities (separated by commma)|
23
21
|vuln_type|False|os,library|Scan target are os and / or library (separated by commma)|
24
22
|ignore_unfixed|False|false|Ignore unfixed vulnerabilities<br>Please specify `true` or `false`|
25
-
|issue|False|true|Decide whether creating issue when vulnerabilities are found by trivy.<br>Please specify `true` or `false`|
26
-
|token|True if issue parameter is true else False|N/A|GitHub Access Token.<br>${{ secrets.GITHUB_TOKEN }} is recommended.|
23
+
|template|False|N/A|Trivy --template option<br>By default, it uses src/template/default.tpl which is based on [contrib/html.tpl](https://github.com/aquasecurity/trivy/blob/main/contrib/html.tpl)<br>reference: [Report Formats - Trivy](https://aquasecurity.github.io/trivy/v0.18.3/examples/report/#template)|
24
+
|token|True|N/A|GitHub Access Token.<br>${{ secrets.GITHUB_TOKEN }} is recommended.|
27
25
|issue_title|False|Security Alert|Issue title|
28
26
|issue_label|False|trivy,vulnerability|Issue label (separated by commma)|
29
27
|issue_assignee|False|N/A|Issue assignee (separated by commma)|
30
28
|fail_on_vulnerabilities|False|false|Whether the action should fail if any vulnerabilities were found.|
31
29
32
-
###Outputs
30
+
## Outputs
33
31
34
32
|Parameter|Description|
35
33
|:--:|:--|
36
34
|html_url|The URL to view the issue|
37
35
|issue_number|The created issue number|
38
36
39
-
## Example Workflow
37
+
## Example
40
38
41
39
Detect your docker image vulnerability everyday at 9:00 (UTC).
}).toThrowError('Trivy option error: INVALID is unknown vuln-type');
114
68
});
115
69
});
116
-
117
-
describe('Parse',()=>{
118
-
constimage: string='alpine:3.10';
119
-
120
-
test('the result without vulnerabilities',()=>{
121
-
constvulnerabilities: Vulnerability[]=[
122
-
{
123
-
Target: 'alpine:3.10 (alpine 3.10.3)',
124
-
Vulnerabilities: null,
125
-
},
126
-
];
127
-
constresult=trivy.parse(image,vulnerabilities);
128
-
expect(result).toBe('');
129
-
});
130
-
131
-
test('the result including vulnerabilities',()=>{
132
-
constvulnerabilities: Vulnerability[]=[
133
-
{
134
-
Target: 'alpine:3.9 (alpine 3.9.4)',
135
-
Vulnerabilities: [
136
-
{
137
-
VulnerabilityID: 'CVE-2019-14697',
138
-
PkgName: 'musl',
139
-
InstalledVersion: '1.1.20-r4',
140
-
FixedVersion: '1.1.20-r5',
141
-
Description:
142
-
"musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.",
Title: 'openssl: information disclosure in fork()',
155
-
Description:
156
-
'OpenSSL 1.1.1 introduced a rewritten random number generator (RNG). This was intended to include protection in the event of a fork() system call in order to ensure that the parent and child processes did not share the same RNG state. However this protection was not being used in the default case. A partial mitigation for this issue is that the output from a high precision timer is mixed into the RNG state so the likelihood of a parent and child process sharing state is significantly reduced. If an application already calls OPENSSL_init_crypto() explicitly using OPENSSL_INIT_ATFORK then this problem does not occur at all. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).',
0 commit comments