diff --git a/.github/workflows/serverless-init-vulnerability-scan.yml b/.github/workflows/serverless-init-vulnerability-scan.yml index 0edbb3ede..a7570ee9a 100644 --- a/.github/workflows/serverless-init-vulnerability-scan.yml +++ b/.github/workflows/serverless-init-vulnerability-scan.yml @@ -16,7 +16,7 @@ jobs: runs-on: ubuntu-22.04 steps: - name: Scan latest serverless-init image with trivy - uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0 with: image-ref: "datadog/serverless-init:latest" ignore-unfixed: true @@ -24,7 +24,7 @@ jobs: format: table - name: Scan latest-alpine serverless-init image with trivy - uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0 with: image-ref: "datadog/serverless-init:latest-alpine" ignore-unfixed: true diff --git a/.github/workflows/vulnerability-scan.yml b/.github/workflows/vulnerability-scan.yml index fa0f8be7f..b9cfa554b 100644 --- a/.github/workflows/vulnerability-scan.yml +++ b/.github/workflows/vulnerability-scan.yml @@ -17,7 +17,7 @@ jobs: runs-on: ubuntu-22.04 steps: - name: Scan latest released image with trivy - uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0 with: image-ref: "public.ecr.aws/datadog/lambda-extension:latest" ignore-unfixed: true @@ -25,7 +25,7 @@ jobs: format: table - name: Scan latest-alpine released image with trivy - uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1 + uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0 with: image-ref: "public.ecr.aws/datadog/lambda-extension:latest-alpine" ignore-unfixed: true