Skip to content

Commit 69ed576

Browse files
thompsonsonclaude
andcommitted
fix: improve security scanning with graceful SARIF upload handling
- Add table format output for immediate vulnerability visibility - Keep SARIF format for GitHub Security tab when permissions allow - Add continue-on-error to prevent CI failure on SARIF upload permission issues - Ensures security scanning always runs and provides results 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <[email protected]>
1 parent 05d254d commit 69ed576

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

.github/workflows/ci.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -98,6 +98,13 @@ jobs:
9898
- uses: actions/checkout@v4
9999

100100
- name: Run Trivy vulnerability scanner
101+
uses: aquasecurity/trivy-action@master
102+
with:
103+
scan-type: 'fs'
104+
scan-ref: '.'
105+
format: 'table'
106+
107+
- name: Run Trivy vulnerability scanner (SARIF)
101108
uses: aquasecurity/trivy-action@master
102109
with:
103110
scan-type: 'fs'
@@ -110,3 +117,4 @@ jobs:
110117
if: always()
111118
with:
112119
sarif_file: 'trivy-results.sarif'
120+
continue-on-error: true

0 commit comments

Comments
 (0)