vulnerability scans #22
Triggered via schedule
December 16, 2024 00:48
Status
Cancelled
Total duration
23h 57m 25s
Artifacts
3
vuln-scans.yml
on: schedule
Matrix: docker-otelcol
check-snyk-token
0s
binaries-windows_amd64
4m 31s
Matrix: anchore-image-scan
Matrix: trivy-image-scan
snyk-fs-scan
0s
Matrix: snyk-docker-scan
Matrix: anchore-win-image-scan
Annotations
7 errors and 5 warnings
trivy-fs-scan
Process completed with exit code 1.
|
anchore-fs-scan
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
|
govulncheck
Resource not accessible by integration
|
anchore-win-image-scan (windows-2019)
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
|
anchore-win-image-scan (windows-2022)
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
|
docker-otelcol (arm64, false)
Canceling since a higher priority waiting request for 'vuln-scans-refs/heads/main' exists
|
docker-otelcol (arm64, true)
Canceling since a higher priority waiting request for 'vuln-scans-refs/heads/main' exists
|
check-snyk-token
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
govulncheck
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
govulncheck
Resource not accessible by integration
|
govulncheck
Resource not accessible by integration
|
govulncheck
Resource not accessible by integration
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
binaries-windows_amd64
|
224 MB |
|
otelcol-amd64
|
459 MB |
|
otelcol-amd64-fips
|
106 MB |
|