intelops / genval

Simplifies configuration management for a wide range of tools, including Dockerfile, Kubernetes manifests, and other infrastructure files.
Apache License 2.0
6 stars 5 forks source link

Upgrade: Bump aquasecurity/trivy-action from 0.24.0 to 0.27.0 #175

Closed dependabot[bot] closed 1 week ago

dependabot[bot] commented 2 weeks ago

Bumps aquasecurity/trivy-action from 0.24.0 to 0.27.0.

Release notes

Sourced from aquasecurity/trivy-action's releases.

v0.27.0

What's Changed

Full Changelog: https://github.com/aquasecurity/trivy-action/compare/0.26.0...0.27.0

v0.26.0

What's Changed

Full Changelog: https://github.com/aquasecurity/trivy-action/compare/0.25.0...0.26.0

v0.25.0

What's Changed

New Contributors

Full Changelog: https://github.com/aquasecurity/trivy-action/compare/0.24.0...0.25.0

Commits


Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
dryrunsecurity[bot] commented 2 weeks ago

DryRun Security Summary

The provided code change updates the GitHub Actions workflow file to use the latest version of the Trivy vulnerability scanner, which improves the project's security posture by performing comprehensive file system scans, focusing on critical and high-severity vulnerabilities, and generating SARIF output for easy integration with other security tools.

Expand for full summary
**Summary:** The provided code change is an update to the GitHub Actions workflow file (`.github/workflows/ci.yaml`) for a project. The primary change is an update to the version of the Trivy vulnerability scanner action used in the workflow. From an application security perspective, this change is a positive step towards improving the security of the project. The key security-related aspects of this change include: 1. **Trivy Vulnerability Scanning**: The update to the latest version of the Trivy vulnerability scanner ensures that the project benefits from the latest vulnerability data and scanning capabilities, which is important for maintaining the overall security posture. 2. **Scan Type**: The workflow is configured to perform a file system (`"fs"`) scan using Trivy, which means it will scan the entire repository for vulnerabilities, rather than just a container image. 3. **Ignoring Unfixed Vulnerabilities**: The workflow is set to `ignore-unfixed: true`, which helps focus the security review on the most critical issues that can be immediately addressed. 4. **SARIF Output**: The Trivy scan results are being output in the SARIF (Static Analysis Results Interchange Format) format, which allows for easy integration with other security tools and the GitHub Security tab. 5. **Severity Filtering**: The workflow is configured to only report on "CRITICAL" and "HIGH" severity vulnerabilities, which helps prioritize the most important security issues. Overall, this code change demonstrates a proactive approach to application security and a commitment to regularly updating and improving the project's security scanning capabilities. **Files Changed:** - `.github/workflows/ci.yaml`: This file is the GitHub Actions workflow configuration for the project. The primary change is an update to the version of the Trivy vulnerability scanner action used in the workflow, from version 0.24.0 to version 0.27.0. The workflow is also configured to perform a file system scan, ignore unfixed vulnerabilities, output the results in the SARIF format, and only report on "CRITICAL" and "HIGH" severity vulnerabilities.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.

dependabot[bot] commented 1 week ago

Superseded by #185.