|
1 | | -# Combined configuration from 11 templates |
2 | | -# Scanners: Semgrep, OWASP Depscan + cdxgen, tfsec, grype, Gitleaks, CDXGen, checkov, Trivy, osv-scanner, Trufflehog, opengrep |
| 1 | +# Combined configuration from 12 templates |
| 2 | +# Scanners: Semgrep, OWASP Depscan + cdxgen, tfsec, grype, Gitleaks, CDXGen, Trivy, checkov, Trivy, osv-scanner, Trufflehog, opengrep |
3 | 3 | # Generated for GITHUB by ScanDog |
4 | 4 | name: Combined Security Scanner Pipeline |
5 | 5 | on: |
@@ -147,6 +147,28 @@ jobs: |
147 | 147 | scanner: cdxgen |
148 | 148 | backend_api_token: ${{ secrets.SCANDOG_BACKEND_API_TOKEN }} |
149 | 149 | backend_url: ${{ secrets.SCANDOG_BACKEND_URL }} |
| 150 | +# Jobs from template: Trivy |
| 151 | + scandog_trivy_scan: |
| 152 | + runs-on: ubuntu-latest |
| 153 | + steps: |
| 154 | + - name: Checkout code |
| 155 | + uses: actions/checkout@v4 |
| 156 | + - name: Trivy vulnerability scanner |
| 157 | + uses: aquasecurity/trivy-action@master |
| 158 | + with: |
| 159 | + image-ref: rabbitmq:management |
| 160 | + format: 'json' |
| 161 | + output: 'trivy-results.json' |
| 162 | + - name: Import results to ScanDog |
| 163 | + uses: scandogio/scandog-import@v1.0 |
| 164 | + with: |
| 165 | + ci_run_id: ${{ github.run_id }} |
| 166 | + report_file: trivy-results.json |
| 167 | + workflow_id: "77870259287eac45b40e65decf2207c3" |
| 168 | + scan_type: Container Scanner |
| 169 | + scanner: Trivy |
| 170 | + backend_api_token: ${{ secrets.SCANDOG_BACKEND_API_TOKEN }} |
| 171 | + backend_url: ${{ secrets.SCANDOG_BACKEND_URL }} |
150 | 172 | # Jobs from template: checkov |
151 | 173 | scandog_checkov_scan: |
152 | 174 | permissions: |
|
0 commit comments