Skip to content

Commit e7a4465

Browse files
Add .github/workflows/scandog-combined-scanner.yml with Scandog security configuration
1 parent de41857 commit e7a4465

1 file changed

Lines changed: 24 additions & 2 deletions

File tree

.github/workflows/scandog-combined-scanner.yml

Lines changed: 24 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
# Combined configuration from 11 templates
2-
# Scanners: Semgrep, OWASP Depscan + cdxgen, tfsec, grype, Gitleaks, CDXGen, checkov, Trivy, osv-scanner, Trufflehog, opengrep
1+
# Combined configuration from 12 templates
2+
# Scanners: Semgrep, OWASP Depscan + cdxgen, tfsec, grype, Gitleaks, CDXGen, Trivy, checkov, Trivy, osv-scanner, Trufflehog, opengrep
33
# Generated for GITHUB by ScanDog
44
name: Combined Security Scanner Pipeline
55
on:
@@ -147,6 +147,28 @@ jobs:
147147
scanner: cdxgen
148148
backend_api_token: ${{ secrets.SCANDOG_BACKEND_API_TOKEN }}
149149
backend_url: ${{ secrets.SCANDOG_BACKEND_URL }}
150+
# Jobs from template: Trivy
151+
scandog_trivy_scan:
152+
runs-on: ubuntu-latest
153+
steps:
154+
- name: Checkout code
155+
uses: actions/checkout@v4
156+
- name: Trivy vulnerability scanner
157+
uses: aquasecurity/trivy-action@master
158+
with:
159+
image-ref: rabbitmq:management
160+
format: 'json'
161+
output: 'trivy-results.json'
162+
- name: Import results to ScanDog
163+
uses: scandogio/scandog-import@v1.0
164+
with:
165+
ci_run_id: ${{ github.run_id }}
166+
report_file: trivy-results.json
167+
workflow_id: "77870259287eac45b40e65decf2207c3"
168+
scan_type: Container Scanner
169+
scanner: Trivy
170+
backend_api_token: ${{ secrets.SCANDOG_BACKEND_API_TOKEN }}
171+
backend_url: ${{ secrets.SCANDOG_BACKEND_URL }}
150172
# Jobs from template: checkov
151173
scandog_checkov_scan:
152174
permissions:

0 commit comments

Comments
 (0)