File tree Expand file tree Collapse file tree 3 files changed +52
-36
lines changed Expand file tree Collapse file tree 3 files changed +52
-36
lines changed Original file line number Diff line number Diff line change 1+ # This file is used by GitHub Dependabot to manage dependencies in the project.
2+
3+ version : 2
4+ updates :
5+ - package-ecosystem : github-actions
6+ directory : /
7+ schedule :
8+ interval : daily
9+
10+ - package-ecosystem : pip
11+ directory : /
12+ schedule :
13+ interval : daily
Original file line number Diff line number Diff line change 77 branch_protection_rule :
88 schedule :
99 - cron : ' 32 4 * * 5'
10+ pull_request :
11+ branches : [ "main" ]
12+ paths-ignore :
13+ - .github/workflows/ossf-scoreboard.yml
1014 push :
1115 branches : [ "main" ]
1216
Original file line number Diff line number Diff line change 1- ---
2- name : trivy
1+ name : trivy
32
4- on :
5- pull_request :
6- types : [ 'opened', 'reopened', 'synchronize' ]
7- merge_group :
8- workflow_dispatch :
3+ on :
4+ pull_request :
5+ types : [ 'opened', 'reopened', 'synchronize' ]
6+ merge_group :
7+ workflow_dispatch :
98
9+ permissions : read-all
1010
11- permissions :
12- actions : read
13- contents : read
14- security-events : write
11+ jobs :
12+ build :
13+ name : ' trivy scan'
14+ runs-on : ubuntu-latest
15+ permissions :
16+ security-events : write
17+ contents : read
1518
16- jobs :
17- build :
18- name : ' trivy scan'
19- runs-on : ubuntu-latest
20- steps :
21- - name : Harden Runner
22- uses : step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
23- with :
24- egress-policy : audit
19+ steps :
20+ - name : Harden Runner
21+ uses : step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
22+ with :
23+ egress-policy : audit
2524
26- - name : Checkout code
27- uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
25+ - name : Checkout code
26+ uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
2827
29- - name : Run Trivy vulnerability scanner (file system)
30- uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
31- with :
32- scan-type : ' fs'
33- ignore-unfixed : true
34- scan-ref : .
35- format : ' sarif'
36- scanners : ' vuln,secret,config'
37- output : report-fs.sarif
28+ - name : Run Trivy vulnerability scanner (file system)
29+ uses : aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
30+ with :
31+ scan-type : ' fs'
32+ ignore-unfixed : true
33+ scan-ref : .
34+ format : ' sarif'
35+ scanners : ' vuln,secret,config'
36+ output : report-fs.sarif
3837
39- - name : Upload Trivy report (fs) GitHub Security
40- uses : github/codeql-action/upload-sarif@d68b2d4edb4189fd2a5366ac14e72027bd4b37dd # v3.28.2
41- with :
42- sarif_file : report-fs.sarif
43- category : ' fs'
38+ - name : Upload Trivy report (fs) GitHub Security
39+ uses : github/codeql-action/upload-sarif@9e8d0789d4a0fa9ceb6b1738f7e269594bdd67f0 # v3.28.9
40+ with :
41+ sarif_file : report-fs.sarif
42+ category : ' fs'
You can’t perform that action at this time.
0 commit comments