Skip to content

Security Scan

Security Scan #54

Workflow file for this run

name: Security Scan
on:
push:
branches:
- "main"
pull_request:
schedule:
- cron: "0 3 * * *"
permissions:
contents: read
actions: read
concurrency:
group: security-${{ github.ref }}
cancel-in-progress: true
jobs:
govulncheck:
name: Go vulnerability check
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
- uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
with:
go-version-file: go.mod
- name: Run govulncheck
uses: golang/govulncheck-action@b625fbe08f3bccbe446d94fbf87fcc875a4f50ee # v1.0.4
with:
check-latest: true
cache: false
output-format: text
trivy:
name: Trivy repo scan
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
with:
fetch-depth: 0
- name: Trivy scan (table)
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
with:
scan-type: fs
scanners: vuln,secret,misconfig
ignore-unfixed: true
format: table
severity: MEDIUM,HIGH,CRITICAL
exit-code: 1