Skip to content

Conversation

@org-internal-bot
Copy link
Contributor

@org-internal-bot org-internal-bot bot commented Jan 15, 2026

Automated release preparation by git-cliff.

Changes

This PR updates versions and changelogs based on conventional commits.

Next Steps

  1. Review the version bumps and changelogs
  2. Merge this PR to trigger automatic publication to OCI registry

🤖 Generated by release-prepare workflow

@github-actions
Copy link

github-actions bot commented Jan 15, 2026

⚠️MegaLinter analysis: Success with warnings

Descriptor Linter Files Fixed Errors Warnings Elapsed time
✅ EDITORCONFIG editorconfig-checker 2 0 0 0.21s
✅ MARKDOWN markdownlint 1 0 0 0.51s
✅ MARKDOWN markdown-table-formatter 1 0 0 0.21s
⚠️ REPOSITORY trivy yes 1 no 5.78s
✅ REPOSITORY trivy-sbom yes no no 0.41s
✅ YAML prettier 1 0 0 0.37s
✅ YAML v8r 1 0 0 2.1s
✅ YAML yamllint 1 0 0 0.37s

Detailed Issues

⚠️ REPOSITORY / trivy - 1 error
2026-01-22T16:15:18Z	INFO	[vulndb] Need to update DB
2026-01-22T16:15:18Z	INFO	[vulndb] Downloading vulnerability DB...
2026-01-22T16:15:18Z	INFO	[vulndb] Downloading artifact...	repo="mirror.gcr.io/aquasec/trivy-db:2"
27.12 MiB / 83.02 MiB [------------------->_________________________________________] 32.67% ? p/s ?70.55 MiB / 83.02 MiB [--------------------------------------------------->_________] 84.98% ? p/s ?83.02 MiB / 83.02 MiB [----------------------------------------------------------->] 100.00% ? p/s ?83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 92.99 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 92.99 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 92.99 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 86.99 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 86.99 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 86.99 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 81.38 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 81.38 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 81.38 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 76.13 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [---------------------------------------------->] 100.00% 76.13 MiB p/s ETA 0s83.02 MiB / 83.02 MiB [-------------------------------------------------] 100.00% 29.90 MiB p/s 3.0s2026-01-22T16:15:21Z	INFO	[vulndb] Artifact successfully downloaded	repo="mirror.gcr.io/aquasec/trivy-db:2"
2026-01-22T16:15:21Z	INFO	[vuln] Vulnerability scanning is enabled
2026-01-22T16:15:21Z	INFO	[misconfig] Misconfiguration scanning is enabled
2026-01-22T16:15:21Z	INFO	[misconfig] Need to update the checks bundle
2026-01-22T16:15:21Z	INFO	[misconfig] Downloading the checks bundle...
165.46 KiB / 165.46 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2026-01-22T16:15:23Z	ERROR	[helm scanner] Failed to render Chart files	file_path="charts/cdviz-collector" err="found in Chart.yaml, but missing in charts/ directory: kubewatch"
2026-01-22T16:15:23Z	INFO	Number of language-specific files	num=0
2026-01-22T16:15:23Z	INFO	Detected config files	num=2

Report Summary

┌────────────────────────────────────────────────┬────────────┬─────────────────┬───────────────────┐
│                     Target                     │    Type    │ Vulnerabilities │ Misconfigurations │
├────────────────────────────────────────────────┼────────────┼─────────────────┼───────────────────┤
│ cdviz-db/Dockerfile                            │ dockerfile │        -        │         0         │
├────────────────────────────────────────────────┼────────────┼─────────────────┼───────────────────┤
│ charts/cdviz-db/templates/job-dbmigration.yaml │    helm    │        -        │         1         │
└────────────────────────────────────────────────┴────────────┴─────────────────┴───────────────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


charts/cdviz-db/templates/job-dbmigration.yaml (helm)
=====================================================
Tests: 93 (SUCCESSES: 92, FAILURES: 1)
Failures: 1 (UNKNOWN: 0, LOW: 1, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

AVD-KSV-0021 (LOW): Container 'cdviz-db-migration' of CronJob 'cdviz-db-migration' should set 'securityContext.runAsGroup' > 10000
════════════════════════════════════════
Force the container to run with group ID > 10000 to avoid conflicts with the host’s user table.

See https://avd.aquasec.com/misconfig/ksv021
────────────────────────────────────────
 charts/cdviz-db/templates/job-dbmigration.yaml:35-64
────────────────────────────────────────
  35 ┌           - name: 'cdviz-db-migration'
  36 │             image: "ghcr.io/cdviz-dev/cdviz-db-migration:1.1.0"
  37 │             # args for https://github.com/golang-migrate/migrate
  38 │             args:
  39 │               - -database
  40 │               - "$(DATABASE_URL)"
  41 │               - -path
  42 │               - /migrations/
  43 └               - up
  ..   
────────────────────────────────────────

See detailed reports in MegaLinter artifacts
Set VALIDATE_ALL_CODEBASE: true in mega-linter.yml to validate all sources, not only the diff

MegaLinter is graciously provided by OX Security

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant