@@ -498,6 +498,21 @@ jobs:
498498> pinned pre-built distribution model. Review the upstream install path and
499499> artifacts carefully before using it in production CI.
500500
501+ > [!IMPORTANT]
502+ > Customer guidance while Trivy is disabled in the Socket Basics GitHub Action:
503+ > if you must keep using Trivy independently in the same workflow, Socket's
504+ > interim recommendation is to pin the Trivy binary to `v0.69.3`.
505+ > Aqua's final incident report lists `v0.69.2` to `v0.69.3` as the
506+ > known-safe binary range; the corresponding Docker image tags are `0.69.2` to
507+ > `0.69.3` without the `v` prefix. We standardize on `v0.69.3` / Docker tag
508+ > `0.69.3` in our examples.
509+ > Do not use `v0.69.4`, and audit any Docker Hub use of `0.69.5` and `0.69.6`.
510+ > If you use Aqua's own actions directly outside Socket Basics, use
511+ > `aquasecurity/trivy-action@v0.35.0` and `aquasecurity/setup-trivy@v0.2.6`, and
512+ > pin them to full commit SHAs.
513+ > Reference:
514+ > https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/
515+
501516` ` ` yaml
502517name: Container Security
503518on:
@@ -534,6 +549,11 @@ jobs:
534549 trivy config --exit-code 1 --severity HIGH,CRITICAL Dockerfile
535550` ` `
536551
552+ If you replace the manual install step with Aqua-maintained actions in your own
553+ workflow outside Socket Basics, Aqua's published safe versions are
554+ ` aquasecurity/trivy-action@v0.35.0` and `aquasecurity/setup-trivy@v0.2.6`.
555+ Pin those to full SHAs rather than mutable tags.
556+
537557# ## Dockerfile Auto-Discovery
538558
539559For repositories with multiple Dockerfiles across different directories, you can automatically discover them instead of manually listing each path.
0 commit comments