diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 940e8f0..c9d7c6c 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -90,7 +90,7 @@ jobs: dotnet-version: ${{ env.DOTNET_VERSION }} - name: Initialize CodeQL - uses: github/codeql-action/init@v4.32.3 + uses: github/codeql-action/init@v4.32.4 with: languages: ${{ matrix.language }} build-mode: manual @@ -101,7 +101,7 @@ jobs: dotnet build OpenReferralApi.sln --configuration Release --no-restore --verbosity normal - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v4.32.3 + uses: github/codeql-action/analyze@v4.32.4 security-scan-fs: name: Trivy Filesystem Scan @@ -113,7 +113,7 @@ jobs: uses: actions/checkout@v6.0.2 - name: Run Trivy (filesystem) - uses: aquasecurity/trivy-action@0.34.0 + uses: aquasecurity/trivy-action@0.34.1 with: scan-type: 'fs' scan-ref: '.' @@ -122,7 +122,7 @@ jobs: severity: 'CRITICAL,HIGH,MEDIUM,UNKNOWN' - name: Upload Trivy FS SARIF - uses: github/codeql-action/upload-sarif@v4.32.3 + uses: github/codeql-action/upload-sarif@v4.32.4 if: always() with: sarif_file: trivy-fs-results.sarif @@ -199,7 +199,7 @@ jobs: password: ${{ secrets.GITHUB_TOKEN }} - name: Run Trivy on built image - uses: aquasecurity/trivy-action@0.34.0 + uses: aquasecurity/trivy-action@0.34.1 continue-on-error: true with: image-ref: ${{ needs.docker-build.outputs.image_ref }} @@ -246,7 +246,7 @@ jobs: fi - name: Upload Trivy Image SARIF - uses: github/codeql-action/upload-sarif@v4.32.3 + uses: github/codeql-action/upload-sarif@v4.32.4 if: steps.trivy_sarif.outputs.present == 'true' with: sarif_file: trivy-image-results.sarif diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index c04e1de..7298808 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -27,7 +27,7 @@ jobs: # 2. Initialize CodeQL - name: Initialize CodeQL - uses: github/codeql-action/init@v4.32.3 + uses: github/codeql-action/init@v4.32.4 with: languages: csharp queries: security-and-quality @@ -41,4 +41,4 @@ jobs: # 4. Perform Analysis - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v4.32.3 \ No newline at end of file + uses: github/codeql-action/analyze@v4.32.4 \ No newline at end of file diff --git a/.github/workflows/trivy.yml b/.github/workflows/trivy.yml index 01abf7d..bbf8df3 100644 --- a/.github/workflows/trivy.yml +++ b/.github/workflows/trivy.yml @@ -19,7 +19,7 @@ jobs: uses: actions/checkout@v6.0.2 - name: Run Trivy vulnerability scanner (Config & Dependency) - uses: aquasecurity/trivy-action@0.34.0 # Use the latest version + uses: aquasecurity/trivy-action@0.34.1 # Use the latest version with: scan-type: 'fs' # Scans the file system scan-ref: '.' @@ -29,7 +29,7 @@ jobs: # Trivy will ignore these checks if you have a .trivyignore file - name: Upload Trivy scan results to GitHub Security - uses: github/codeql-action/upload-sarif@v4.32.3 + uses: github/codeql-action/upload-sarif@v4.32.4 if: always() # Upload results even if vulnerabilities are found with: sarif_file: 'trivy-results.sarif' \ No newline at end of file