Skip to content

Commit

Permalink
Enabled Trivy Scan
Browse files Browse the repository at this point in the history
  • Loading branch information
omers committed Dec 9, 2023
1 parent bc12141 commit b76841a
Show file tree
Hide file tree
Showing 2 changed files with 15 additions and 10 deletions.
24 changes: 14 additions & 10 deletions .github/workflows/tfsec.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,8 @@ on:
- cron: '43 18 * * 2'

jobs:
tfsec:
name: Run tfsec sarif report
Trivy:
name: Run Trivy sarif report
runs-on: ubuntu-latest
permissions:
actions: read
Expand All @@ -25,13 +25,17 @@ jobs:
- name: Clone repo
uses: actions/checkout@v3

- name: Run tfsec
uses: aquasecurity/tfsec-sarif-action@9a83b5c3524f825c020e356335855741fd02745f
with:
sarif_file: tfsec.sarif

- name: Upload SARIF file
- name: Run Trivy vulnerability scanner in IaC mode
uses: aquasecurity/trivy-action@master
with:
scan-type: 'config'
hide-progress: false
format: 'sarif'
output: 'trivy-results.sarif'
exit-code: '1'
ignore-unfixed: true
severity: 'CRITICAL,HIGH'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2
with:
# Path to SARIF file relative to the root of the repository
sarif_file: tfsec.sarif
sarif_file: 'trivy-results.sarif'
1 change: 1 addition & 0 deletions .trivyignore
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
AVD-AWS-0136

0 comments on commit b76841a

Please sign in to comment.