99 - master
1010 schedule :
1111 # Run daily at 00:00 UTC
12- - cron : ' 0 0 * * *'
12+ - cron : " 0 0 * * *"
1313 workflow_dispatch : # Allow manual trigger
1414
1515permissions :
@@ -29,28 +29,28 @@ jobs:
2929 - name : Run Trivy vulnerability scanner (source code)
3030 uses :
aquasecurity/[email protected] 3131 with :
32- scan-type : ' fs '
33- scan-ref : ' . '
34- scanners : ' vuln,secret,misconfig'
35- format : ' sarif'
36- output : ' trivy-results.sarif'
37- severity : ' CRITICAL,HIGH,MEDIUM'
32+ scan-type : " fs "
33+ scan-ref : " . "
34+ scanners : " vuln,secret,misconfig"
35+ format : " sarif"
36+ output : " trivy-results.sarif"
37+ severity : " CRITICAL,HIGH,MEDIUM"
3838 ignore-unfixed : true
3939
4040 - name : Upload Trivy results to GitHub Security tab
4141 uses : github/codeql-action/upload-sarif@v4
4242 if : always()
4343 with :
44- sarif_file : ' trivy-results.sarif'
44+ sarif_file : " trivy-results.sarif"
4545
4646 - name : Run Trivy scanner (table output for logs)
4747 uses :
aquasecurity/[email protected] 4848 if : always()
4949 with :
50- scan-type : ' fs '
51- scan-ref : ' . '
52- scanners : ' vuln,secret,misconfig'
53- format : ' table'
54- severity : ' CRITICAL,HIGH,MEDIUM'
50+ scan-type : " fs "
51+ scan-ref : " . "
52+ scanners : " vuln,secret,misconfig"
53+ format : " table"
54+ severity : " CRITICAL,HIGH,MEDIUM"
5555 ignore-unfixed : true
56- exit-code : ' 1 '
56+ exit-code : " 1 "
0 commit comments