From 39ea38281154831b73eaee8758a93f9dd3151d32 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 5 Mar 2026 23:21:38 +0200 Subject: [PATCH] =?UTF-8?q?chore(deps):=20update=20aquasecurity/trivy-acti?= =?UTF-8?q?on=20action=20(0.34.1=20=E2=86=92=200.34.2)=20(#180)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> --- .github/workflows/security.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/security.yml b/.github/workflows/security.yml index 5bc65c5..ffbd6ee 100644 --- a/.github/workflows/security.yml +++ b/.github/workflows/security.yml @@ -54,7 +54,7 @@ jobs: fetch-depth: 0 - name: Run Trivy vulnerability scanner in repo mode - uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # 0.34.1 + uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 with: scan-type: "fs" scan-ref: "." @@ -69,7 +69,7 @@ jobs: sarif_file: "trivy-results.sarif" - name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph - uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # 0.34.1 + uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 with: scan-type: "fs" format: "github" @@ -135,7 +135,7 @@ jobs: run: docker build --build-arg TARGETPLATFORM=${{ env.TARGETPLATFORM }} -t gh-action-readme:test . - name: Run Trivy vulnerability scanner on Docker image - uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # 0.34.1 + uses: aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # 0.34.2 with: image-ref: "gh-action-readme:test" format: "sarif"