diff --git a/.github/workflows/trivy-test-images.yml b/.github/workflows/trivy-test-images.yml index 44b186b..e201f1a 100644 --- a/.github/workflows/trivy-test-images.yml +++ b/.github/workflows/trivy-test-images.yml @@ -86,7 +86,7 @@ jobs: - name: Run Trivy Table - uses: aquasecurity/trivy-action@0.19.0 + uses: aquasecurity/trivy-action@0.23.0 with: scan-type: 'image' image-ref: 'backend:latest' diff --git a/.github/workflows/trivy.yml b/.github/workflows/trivy.yml index aa65b95..51ff69d 100644 --- a/.github/workflows/trivy.yml +++ b/.github/workflows/trivy.yml @@ -18,7 +18,7 @@ jobs: uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 - name: Run Trivy vulnerability scanner in repo mode - uses: aquasecurity/trivy-action@2b6a709cf9c4025c5438138008beaddbb02086f0 # v0.14.0 + uses: aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23.0 with: image-ref: "tractusx/vas-country-risk:latest" format: "sarif" @@ -42,7 +42,7 @@ jobs: steps: # Pull image from Docker Hub and run Trivy vulnerability scanner - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@2b6a709cf9c4025c5438138008beaddbb02086f0 # v0.14.0 + uses: aquasecurity/trivy-action@7c2007bcb556501da015201bcba5aa14069b74e2 # v0.23.0 with: image-ref: "tractusx/vas-country-risk-backend:latest" format: "sarif"