diff --git a/.github/workflows/research-vuln-scan.yml b/.github/workflows/research-vuln-scan.yml index 9ad6c0f..1c9ad67 100644 --- a/.github/workflows/research-vuln-scan.yml +++ b/.github/workflows/research-vuln-scan.yml @@ -23,7 +23,7 @@ jobs: uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2 - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 + uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 with: image-ref: '${{ vars.GREENBONE_REGISTRY }}/opensight/opensight-postgres:16' format: 'template' @@ -36,7 +36,7 @@ jobs: TRIVY_PASSWORD: ${{ secrets.GREENBONE_REGISTRY_READ_TOKEN }} - name: Upload Trivy scan results to GitHub Security tab - uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v3.29.5 + uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3.29.5 with: sarif_file: 'trivy-results.sarif' category: ${{ github.jobs[github.job].name }} @@ -53,7 +53,7 @@ jobs: uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2 - name: Login to Greenbone Product container registry - uses: docker/login-action@c94ce9fb468520275223c153574b00df6fe4bcc9 #v3.7.0 + uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 #v4.0.0 with: registry: ${{ vars.GREENBONE_REGISTRY }} username: ${{ secrets.GREENBONE_REGISTRY_READ_USER }} @@ -68,7 +68,7 @@ jobs: severity-cutoff: medium - name: Upload grype vulnerability report - uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v3.29.5 + uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3.29.5 with: sarif_file: ${{ steps.grype.outputs.sarif }} category: ${{ github.jobs[github.job].name }} @@ -86,7 +86,7 @@ jobs: uses: actions/checkout@0c366fd6a839edf440554fa01a7085ccba70ac98 # v4.2.2 - name: Login to Greenbone Product container registry - uses: docker/login-action@c94ce9fb468520275223c153574b00df6fe4bcc9 #v3.7.0 + uses: docker/login-action@b45d80f862d83dbcd57f89517bcf500b2ab88fb2 #v4.0.0 with: registry: ${{ vars.GREENBONE_REGISTRY }} username: ${{ secrets.GREENBONE_REGISTRY_READ_USER }} @@ -108,7 +108,7 @@ jobs: - name: Upload docker scout SARIF result id: upload-sarif if: ${{ github.event_name != 'pull_request_target' }} - uses: github/codeql-action/upload-sarif@89a39a4e59826350b863aa6b6252a07ad50cf83e # v3.29.5 + uses: github/codeql-action/upload-sarif@0d579ffd059c29b07949a3cce3983f0780820c98 # v3.29.5 with: sarif_file: sarif.output.json category: ${{ github.jobs[github.job].name }}