name: Container Vulnerability Scan
on:
push:
branches: [ "develop", "main" ]
pull_request:
branches: [ "develop", "main" ]
permissions: read-all
jobs:
trivy:
runs-on: ubuntu-latest
timeout-minutes: 30
permissions:
contents: read
security-events: write
actions: read
steps:
- name: Checkout code
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd
- name: Basic Check
run: ls -la
- name: Run Trivy vulnerability scanner in fs mode
if: hashFiles('Dockerfile') != ''
uses: aquasecurity/trivy-action@a9c7b0f06e461e9d4b4d1711f154ee024b8d7ab8 with:
scan-type: 'fs'
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
- name: Upload Trivy scan results to GitHub Security tab
if: hashFiles('Dockerfile') != ''
uses: github/codeql-action/upload-sarif@f25eda876ebb741d872b63b9f2c6dfdd77f14b83 with:
sarif_file: 'trivy-results.sarif'
continue-on-error: true