37
37
uses : ./.github/actions/setup-go
38
38
39
39
- name : Initialize CodeQL
40
- uses : github/codeql-action/init@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
40
+ uses : github/codeql-action/init@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13
41
41
with :
42
42
languages : go, javascript
43
43
47
47
rm Makefile
48
48
49
49
- name : Perform CodeQL Analysis
50
- uses : github/codeql-action/analyze@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
50
+ uses : github/codeql-action/analyze@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13
51
51
52
52
- name : Send Slack notification on failure
53
53
if : ${{ failure() }}
@@ -124,15 +124,15 @@ jobs:
124
124
echo "image=$(cat "$image_job")" >> $GITHUB_OUTPUT
125
125
126
126
- name : Run Trivy vulnerability scanner
127
- uses : aquasecurity/trivy-action@5681af892cd0f4997658e2bacc62bd0a894cf564
127
+ uses : aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2
128
128
with :
129
129
image-ref : ${{ steps.build.outputs.image }}
130
130
format : sarif
131
131
output : trivy-results.sarif
132
132
severity : " CRITICAL,HIGH"
133
133
134
134
- name : Upload Trivy scan results to GitHub Security tab
135
- uses : github/codeql-action/upload-sarif@c36620d31ac7c881962c3d9dd939c40ec9434f2b # v3.26.12
135
+ uses : github/codeql-action/upload-sarif@f779452ac5af1c261dce0346a8f964149f49322b # v3.26.13
136
136
with :
137
137
sarif_file : trivy-results.sarif
138
138
category : " Trivy"
@@ -147,7 +147,7 @@ jobs:
147
147
# Prisma cloud scan runs last because it fails the entire job if it
148
148
# detects vulnerabilities. :|
149
149
- name : Run Prisma Cloud image scan
150
- uses : PaloAltoNetworks/prisma-cloud-scan@1f38c94d789ff9b01a4e80070b442294ebd3e362 # v1.4.0
150
+ uses : PaloAltoNetworks/prisma-cloud-scan@124b48d8325c23f58a35da0f1b4d9a6b54301d05 # v1.6.7
151
151
with :
152
152
pcc_console_url : ${{ secrets.PRISMA_CLOUD_URL }}
153
153
pcc_user : ${{ secrets.PRISMA_CLOUD_ACCESS_KEY }}
0 commit comments