4141 tags : pyatlan-trivy:latest
4242
4343 - name : Trivy image scan (table)
44- uses : aquasecurity/trivy-action@0.34.2
44+ uses : aquasecurity/trivy-action@0.35.0
4545 with :
4646 image-ref : pyatlan-trivy:latest
4747 scanners : ' vuln'
6767 fi
6868
6969 - name : Trivy image scan (SARIF)
70- uses : aquasecurity/trivy-action@0.34.2
70+ uses : aquasecurity/trivy-action@0.35.0
7171 with :
7272 image-ref : pyatlan-trivy:latest
7373 scanners : ' vuln'
8282 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
8383
8484 - name : Trivy dependency scan (uv.lock, table)
85- uses : aquasecurity/trivy-action@0.34.2
85+ uses : aquasecurity/trivy-action@0.35.0
8686 with :
8787 scan-type : fs
8888 scan-ref : uv.lock
@@ -108,7 +108,7 @@ jobs:
108108 fi
109109
110110 - name : Trivy dependency scan (uv.lock, SARIF)
111- uses : aquasecurity/trivy-action@0.34.2
111+ uses : aquasecurity/trivy-action@0.35.0
112112 with :
113113 scan-type : fs
114114 scan-ref : uv.lock
@@ -163,7 +163,7 @@ jobs:
163163 } >> "$GITHUB_STEP_SUMMARY"
164164
165165 - name : Fail on High/Critical vulnerabilities (image)
166- uses : aquasecurity/trivy-action@0.34.2
166+ uses : aquasecurity/trivy-action@0.35.0
167167 with :
168168 image-ref : pyatlan-trivy:latest
169169 scanners : ' vuln'
@@ -177,7 +177,7 @@ jobs:
177177 TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
178178
179179 - name : Fail on High/Critical vulnerabilities (uv.lock)
180- uses : aquasecurity/trivy-action@0.34.2
180+ uses : aquasecurity/trivy-action@0.35.0
181181 with :
182182 scan-type : fs
183183 scan-ref : uv.lock
0 commit comments