diff --git a/.github/workflows/hadolint.yml b/.github/workflows/hadolint.yml index c3cb7b7..312745d 100644 --- a/.github/workflows/hadolint.yml +++ b/.github/workflows/hadolint.yml @@ -12,7 +12,7 @@ jobs: - name: Check out code uses: actions/checkout@v4 - name: Scanning the dockerfile - uses: reviewdog/action-hadolint@v1.42.0 + uses: reviewdog/action-hadolint@v1.44.0 with: reporter: github-pr-review filter_mode: file diff --git a/.github/workflows/trivy.yml b/.github/workflows/trivy.yml index e20c948..69dedd3 100644 --- a/.github/workflows/trivy.yml +++ b/.github/workflows/trivy.yml @@ -32,14 +32,14 @@ jobs: run: git lfs checkout - name: Run Trivy vulnerability scanner in repo mode (table) - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: scan-type: 'fs' ignore-unfixed: true format: 'table' - name: Run Trivy vulnerability scanner in repo mode (sarif) - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: scan-type: 'fs' ignore-unfixed: true @@ -72,14 +72,14 @@ jobs: run: | docker build -t ${{ github.sha }} . - name: Run Trivy vulnerability scanner in image mode (table output) - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: image-ref: '${{ github.sha }}' ignore-unfixed: true format: 'table' - name: Run Trivy vulnerability scanner in image mode (sarif output) - uses: aquasecurity/trivy-action@0.23.0 + uses: aquasecurity/trivy-action@0.24.0 with: image-ref: '${{ github.sha }}' ignore-unfixed: true