From 1fb9d2734fe5aeda5c15b451d6bafd937c59def9 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Fri, 23 Jan 2026 00:08:43 +0000 Subject: [PATCH] chore(deps): bump aquasecurity/trivy-action Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from d9cd5b1c23aaf8cb31bb09141028215828364bbb to 22438a435773de8c97dc0958cc0b823c45b064ac. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](https://github.com/aquasecurity/trivy-action/compare/d9cd5b1c23aaf8cb31bb09141028215828364bbb...22438a435773de8c97dc0958cc0b823c45b064ac) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-version: 22438a435773de8c97dc0958cc0b823c45b064ac dependency-type: direct:production ... Signed-off-by: dependabot[bot] --- .github/workflows/security-audit.yml | 4 ++-- .github/workflows/security.yml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/security-audit.yml b/.github/workflows/security-audit.yml index 5258957..c4a9b2b 100644 --- a/.github/workflows/security-audit.yml +++ b/.github/workflows/security-audit.yml @@ -231,7 +231,7 @@ jobs: docker build -t ${{ steps.image.outputs.name }}:scan -f ${{ matrix.dockerfile }} . - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@d9cd5b1c23aaf8cb31bb09141028215828364bbb # 0.28.0 + uses: aquasecurity/trivy-action@22438a435773de8c97dc0958cc0b823c45b064ac # 0.28.0 with: image-ref: '${{ steps.image.outputs.name }}:scan' format: 'sarif' @@ -240,7 +240,7 @@ jobs: ignore-unfixed: true - name: Run Trivy (table output) - uses: aquasecurity/trivy-action@d9cd5b1c23aaf8cb31bb09141028215828364bbb # 0.28.0 + uses: aquasecurity/trivy-action@22438a435773de8c97dc0958cc0b823c45b064ac # 0.28.0 with: image-ref: '${{ steps.image.outputs.name }}:scan' format: 'table' diff --git a/.github/workflows/security.yml b/.github/workflows/security.yml index 43eca9e..47577d0 100644 --- a/.github/workflows/security.yml +++ b/.github/workflows/security.yml @@ -285,7 +285,7 @@ jobs: docker build -t cicd-hyper-a:scan -f deploy/Dockerfile . - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@d9cd5b1c23aaf8cb31bb09141028215828364bbb # 0.28.0 + uses: aquasecurity/trivy-action@22438a435773de8c97dc0958cc0b823c45b064ac # 0.28.0 with: image-ref: 'cicd-hyper-a:scan' format: 'sarif'