Skip to content

vulnerability scans #22

vulnerability scans

vulnerability scans #22

Triggered via schedule December 16, 2024 00:48
Status Cancelled
Total duration 23h 57m 25s
Artifacts 3

vuln-scans.yml

on: schedule
Matrix: docker-otelcol
check-snyk-token
0s
check-snyk-token
binaries-windows_amd64
4m 31s
binaries-windows_amd64
trivy-fs-scan
13s
trivy-fs-scan
anchore-fs-scan
13s
anchore-fs-scan
govulncheck
2m 39s
govulncheck
Matrix: anchore-image-scan
Matrix: trivy-image-scan
snyk-fs-scan
0s
snyk-fs-scan
Matrix: snyk-docker-scan
Matrix: anchore-win-image-scan
Fit to window
Zoom out
Zoom in

Annotations

7 errors and 5 warnings
trivy-fs-scan
Process completed with exit code 1.
anchore-fs-scan
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
govulncheck
Resource not accessible by integration
anchore-win-image-scan (windows-2019)
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
anchore-win-image-scan (windows-2022)
Failed minimum severity level. Found vulnerabilities with level 'high' or higher
docker-otelcol (arm64, false)
Canceling since a higher priority waiting request for 'vuln-scans-refs/heads/main' exists
docker-otelcol (arm64, true)
Canceling since a higher priority waiting request for 'vuln-scans-refs/heads/main' exists
check-snyk-token
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
govulncheck
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
govulncheck
Resource not accessible by integration
govulncheck
Resource not accessible by integration
govulncheck
Resource not accessible by integration

Artifacts

Produced during runtime
Name Size
binaries-windows_amd64
224 MB
otelcol-amd64
459 MB
otelcol-amd64-fips
106 MB