diff --git a/.github/workflows/publish.yml b/.github/workflows/publish.yml index 933a551..5c84d34 100644 --- a/.github/workflows/publish.yml +++ b/.github/workflows/publish.yml @@ -190,7 +190,7 @@ jobs: # HIGH/CRITICAL: if something slips through dependabot, the workflow # fails loudly rather than silently shipping a known-vulnerable image. - name: Trivy scan published image - uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 + uses: aquasecurity/trivy-action@ed142fd0673e97e23eac54620cfb913e5ce36c25 # v0.36.0 with: image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}@${{ steps.build.outputs.digest }} format: sarif diff --git a/.github/workflows/security.yml b/.github/workflows/security.yml index e95992d..ed56955 100644 --- a/.github/workflows/security.yml +++ b/.github/workflows/security.yml @@ -35,7 +35,7 @@ jobs: # Pinned to SHA (0.35.0) per GHSA-69fq-xp46-6x23 (Mar 2026 supply-chain # attack). 0.35.0 is the only tag that was immutable-release-protected; # SHA pinning prevents future tag-mutation attacks of the same class. - uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 + uses: aquasecurity/trivy-action@ed142fd0673e97e23eac54620cfb913e5ce36c25 # v0.36.0 with: scan-type: fs scan-ref: . @@ -45,7 +45,7 @@ jobs: ignore-unfixed: 'true' - name: Run Trivy fs scan - uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0 + uses: aquasecurity/trivy-action@ed142fd0673e97e23eac54620cfb913e5ce36c25 # v0.36.0 with: scan-type: fs scan-ref: .