diff --git a/.github/workflows/research-vuln-scan.yml b/.github/workflows/research-vuln-scan.yml index e0d02e2..e4e4454 100644 --- a/.github/workflows/research-vuln-scan.yml +++ b/.github/workflows/research-vuln-scan.yml @@ -23,7 +23,7 @@ jobs: uses: actions/checkout@ff7abcd0c3c05ccf6adc123a8cd1fd4fb30fb493 # v4.2.2 - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@f9424c10c36e288d5fa79bd3dfd1aeb2d6eae808 + uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 with: image-ref: '${{ vars.GREENBONE_REGISTRY }}/opensight/opensight-postgres:16' format: 'template' @@ -36,7 +36,7 @@ jobs: TRIVY_PASSWORD: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }} - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.5 + uses: github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3.29.5 with: sarif_file: 'trivy-results.sarif' category: ${{ github.jobs[github.job].name }} @@ -68,7 +68,7 @@ jobs: severity-cutoff: medium - name: Upload grype vulnerability report - uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.5 + uses: github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3.29.5 with: sarif_file: ${{ steps.grype.outputs.sarif }} category: ${{ github.jobs[github.job].name }} @@ -108,7 +108,7 @@ jobs: - name: Upload docker scout SARIF result id: upload-sarif if: ${{ github.event_name != 'pull_request_target' }} - uses: github/codeql-action/upload-sarif@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.5 + uses: github/codeql-action/upload-sarif@f1f6e5f6af878fb37288ce1c627459e94dbf7d01 # v3.29.5 with: sarif_file: sarif.output.json category: ${{ github.jobs[github.job].name }}