Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Add SAP Configuration Checks to STAF #300

Add SAP Configuration Checks to STAF

Add SAP Configuration Checks to STAF #300

Workflow file for this run

name: trivy
on:
pull_request:
types: [ 'opened', 'reopened', 'synchronize' ]
merge_group:
workflow_dispatch:
permissions: read-all
jobs:
build:
name: 'trivy scan'
runs-on: ubuntu-latest
permissions:
security-events: write
contents: read
steps:
- name: Harden Runner
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
with:
egress-policy: audit
- name: Checkout code
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
- name: Run Trivy vulnerability scanner (file system)
uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # 0.29.0
with:
scan-type: 'fs'
ignore-unfixed: true
scan-ref: .
format: 'sarif'
scanners: 'vuln,secret,config'
output: report-fs.sarif
- name: Upload Trivy report (fs) GitHub Security
uses: github/codeql-action/upload-sarif@07bb2b932c90fc1ec97637495e4072a0966fa74c # v3.28.20
with:
sarif_file: report-fs.sarif
category: 'fs'
Morty Proxy This is a proxified and sanitized view of the page, visit original site.