From 352bcfd18051cb0e07487817807961e7a76c9894 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 14:16:27 +0000 Subject: [PATCH] chore(deps): bump aquasecurity/trivy-action Bumps [aquasecurity/trivy-action](https://github.com/aquasecurity/trivy-action) from 22438a435773de8c97dc0958cc0b823c45b064ac to c1824fd6edce30d7ab345a9989de00bbd46ef284. - [Release notes](https://github.com/aquasecurity/trivy-action/releases) - [Commits](https://github.com/aquasecurity/trivy-action/compare/22438a435773de8c97dc0958cc0b823c45b064ac...c1824fd6edce30d7ab345a9989de00bbd46ef284) --- updated-dependencies: - dependency-name: aquasecurity/trivy-action dependency-version: c1824fd6edce30d7ab345a9989de00bbd46ef284 dependency-type: direct:production ... Signed-off-by: dependabot[bot] --- .github/workflows/security-audit.yml | 4 ++-- .github/workflows/security.yml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/security-audit.yml b/.github/workflows/security-audit.yml index f32f663..697faaf 100644 --- a/.github/workflows/security-audit.yml +++ b/.github/workflows/security-audit.yml @@ -231,7 +231,7 @@ jobs: docker build -t ${{ steps.image.outputs.name }}:scan -f ${{ matrix.dockerfile }} . - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@22438a435773de8c97dc0958cc0b823c45b064ac # 0.28.0 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.28.0 with: image-ref: '${{ steps.image.outputs.name }}:scan' format: 'sarif' @@ -240,7 +240,7 @@ jobs: ignore-unfixed: true - name: Run Trivy (table output) - uses: aquasecurity/trivy-action@22438a435773de8c97dc0958cc0b823c45b064ac # 0.28.0 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.28.0 with: image-ref: '${{ steps.image.outputs.name }}:scan' format: 'table' diff --git a/.github/workflows/security.yml b/.github/workflows/security.yml index 92115c4..f5360b2 100644 --- a/.github/workflows/security.yml +++ b/.github/workflows/security.yml @@ -285,7 +285,7 @@ jobs: docker build -t cicd-hyper-a:scan -f deploy/Containerfile . - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@22438a435773de8c97dc0958cc0b823c45b064ac # 0.28.0 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # 0.28.0 with: image-ref: 'cicd-hyper-a:scan' format: 'sarif'