diff --git a/.github/trivy/daily-scan.trivyignore.yaml b/.github/trivy/daily-scan.trivyignore.yaml index 93b5f1b6bb..e2f6703027 100644 --- a/.github/trivy/daily-scan.trivyignore.yaml +++ b/.github/trivy/daily-scan.trivyignore.yaml @@ -13,7 +13,7 @@ vulnerabilities: - id: CVE-2026-33870 statement: "Netty HTTP/1.1 Request Smuggling. Fix: bump netty-bom to 4.1.132.Final. https://github.com/aws-observability/aws-otel-java-instrumentation/issues/1346" - expired_at: 2026-04-14 + expired_at: 2026-04-28 - id: CVE-2026-33871 statement: "Netty HTTP/2 CONTINUATION frame flood DoS. Fix: bump netty-bom to 4.1.132.Final. https://github.com/aws-observability/aws-otel-java-instrumentation/issues/1346" - expired_at: 2026-04-14 + expired_at: 2026-04-28 diff --git a/.github/trivy/pr-build.trivyignore.yaml b/.github/trivy/pr-build.trivyignore.yaml index c696f26770..45f9cb8832 100644 --- a/.github/trivy/pr-build.trivyignore.yaml +++ b/.github/trivy/pr-build.trivyignore.yaml @@ -11,7 +11,7 @@ vulnerabilities: - id: CVE-2026-33870 statement: "Netty HTTP/1.1 Request Smuggling. Fix: bump netty-bom to 4.1.132.Final. https://github.com/aws-observability/aws-otel-java-instrumentation/issues/1346" - expired_at: 2026-04-21 + expired_at: 2026-04-28 - id: CVE-2026-33871 statement: "Netty HTTP/2 CONTINUATION frame flood DoS. Fix: bump netty-bom to 4.1.132.Final. https://github.com/aws-observability/aws-otel-java-instrumentation/issues/1346" - expired_at: 2026-04-21 + expired_at: 2026-04-28 diff --git a/.github/workflows/claude-code-review.yml b/.github/workflows/claude-code-review.yml index a3e34706ec..b26e8699e4 100644 --- a/.github/workflows/claude-code-review.yml +++ b/.github/workflows/claude-code-review.yml @@ -1,7 +1,7 @@ name: Claude Code Review on: - pull_request: + pull_request_target: branches: - main types: [opened, synchronize, ready_for_review, reopened]