vulnerability scans #21
Triggered via schedule
December 13, 2024 00:46
Status
Failure
Total duration
1d 2h 5m 14s
Artifacts
3
vuln-scans.yml
on: schedule
Matrix: docker-otelcol
check-snyk-token
0s
binaries-windows_amd64
4m 30s
Matrix: anchore-image-scan
Matrix: trivy-image-scan
snyk-fs-scan
0s
Matrix: snyk-docker-scan
Matrix: anchore-win-image-scan
Annotations
7 errors and 5 warnings
trivy-fs-scan
Process completed with exit code 1.
|
anchore-fs-scan
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
|
govulncheck
Resource not accessible by integration
|
anchore-win-image-scan (windows-2022)
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
|
anchore-win-image-scan (windows-2019)
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
|
docker-otelcol (arm64, false)
This request was automatically failed because there were no enabled runners online to process the request for more than 1 days.
|
docker-otelcol (arm64, true)
This request was automatically failed because there were no enabled runners online to process the request for more than 1 days.
|
check-snyk-token
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
govulncheck
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
govulncheck
Resource not accessible by integration
|
govulncheck
Resource not accessible by integration
|
govulncheck
Resource not accessible by integration
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
binaries-windows_amd64
|
224 MB |
|
otelcol-amd64
|
459 MB |
|
otelcol-amd64-fips
|
106 MB |
|