Bump org.apache.logging.log4j:log4j-core from 2.14.1 to 2.23.1 in /supply-chain/vulnerable-application #19
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This workflow runs the Trivy in IaC mode. | |
# The action itself can be found here: https://github.com/aquasecurity/trivy-action | |
# The documentation for running Trivy in config mode can be found here: https://aquasecurity.github.io/trivy/v0.19.2/usage/vuln-type/config/ | |
# Note: If you have run Tfsec in the past, the Trivy Config scan is the result of the Aquasec acquisition of Tfsec: https://www.aquasec.com/news/aqua-security-acquires-tfsec/ | |
name: Trivy IaC Scan | |
on: | |
pull_request: | |
push: | |
branches: ["main"] | |
# ensures only one run of the workflow happens per branch or per run (if not associated with a branch) | |
concurrency: | |
group: ${{ github.workflow }}-${{ github.head_ref || github.run_id }} | |
cancel-in-progress: true | |
jobs: | |
build: | |
name: Build | |
runs-on: [ubuntu-latest] | |
steps: | |
- name: Checkout code | |
uses: actions/checkout@v3 | |
- name: Run Trivy IaC Scan | |
uses: aquasecurity/trivy-action@master | |
with: | |
severity: "HIGH,CRITICAL" | |
scan-type: "config" | |
hide-progress: false | |
format: "sarif" | |
output: "trivy-results.sarif" | |
ignore-unfixed: true | |
vuln-type: config | |
- name: Upload Trivy scan results to GitHub Security tab | |
uses: github/codeql-action/upload-sarif@v2 | |
with: | |
sarif_file: "trivy-results.sarif" |