Skip to content

Commit

Permalink
Add Trivy vulnerability scanner in IaC mode and upload scan results t…
Browse files Browse the repository at this point in the history
…o GitHub Security tab

This commit adds a new step to the workflow that runs Trivy vulnerability scanner in Infrastructure as Code (IaC) mode. The scanner is configured to scan for critical and high severity vulnerabilities, and the results are saved in SARIF format. Additionally, this commit includes another step that uploads the Trivy scan results to the GitHub Security tab using the codeql-action/upload-sarif action.
  • Loading branch information
stefanfreitag committed Oct 21, 2023
1 parent 0d9c5a1 commit d00a7ec
Showing 1 changed file with 14 additions and 0 deletions.
14 changes: 14 additions & 0 deletions .github/workflows/tf-module-actions.yml
Original file line number Diff line number Diff line change
Expand Up @@ -20,3 +20,17 @@ jobs:
output-file: README.md
output-method: inject
git-push: "true"
- name: Run Trivy vulnerability scanner in IaC mode
uses: aquasecurity/trivy-action@master
with:
scan-type: 'config'
hide-progress: false
format: 'sarif'
output: 'trivy-results.sarif'
exit-code: '1'
ignore-unfixed: true
severity: 'CRITICAL,HIGH'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: 'trivy-results.sarif'

0 comments on commit d00a7ec

Please sign in to comment.