Skip to content

Commit

Permalink
Add CVE-2025-0395 to .trivyignore (#1362)
Browse files Browse the repository at this point in the history
* fixing trivy issue

* updated description for trivyignore.yaml

* removed trivyignore.yaml and adding plain text

* fixing trivy issue

* updated description for trivyignore.yaml

* removed trivyignore.yaml and adding plain text

* including trivyignore
  • Loading branch information
rajithkrishnegowda authored Feb 12, 2025
1 parent 72c70d5 commit a64af0b
Show file tree
Hide file tree
Showing 2 changed files with 28 additions and 0 deletions.
26 changes: 26 additions & 0 deletions .github/workflows/trivy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,12 @@ jobs:
--db-repository 'ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db' \
.
- name: Display Trivy Scan Results
if: failure() # Ensure this step runs regardless of the previous step's outcome
run: |
echo "Trivy Scan Results:"
cat trivy-docker-results.json | jq '.Results[] | select(.Vulnerabilities != null) | .Vulnerabilities[] | {VulnerabilityID, PkgName, InstalledVersion, Severity, Description}'
- name: Upload Code Vulnerability Scan Results
uses: actions/upload-artifact@v4
with:
Expand All @@ -71,9 +77,16 @@ jobs:
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH,MEDIUM,LOW'
trivyignores: '.trivyignore'
env:
TRIVY_DB_REPOSITORY: 'ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db'

- name: Display Trivy Scan Results
if: failure() # Ensure this step runs regardless of the previous step's outcome
run: |
echo "Trivy Scan Results:"
cat trivy-docker-results.json | jq '.Results[] | select(.Vulnerabilities != null) | .Vulnerabilities[] | {VulnerabilityID, PkgName, InstalledVersion, Severity, Description}'
- name: Upload Docker Vulnerability Scan
uses: actions/upload-artifact@v4
with:
Expand All @@ -91,6 +104,12 @@ jobs:
--db-repository 'ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db' \
.
- name: Display Trivy Scan Results
if: failure() # Ensure this step runs regardless of the previous step's outcome
run: |
echo "Trivy Scan Results:"
cat trivy-docker-results.json | jq '.Results[] | select(.Vulnerabilities != null) | .Vulnerabilities[] | {VulnerabilityID, PkgName, InstalledVersion, Severity, Description}'
- name: Upload Code Vulnerability Scan Results
uses: actions/upload-artifact@v4
with:
Expand All @@ -107,9 +126,16 @@ jobs:
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH,MEDIUM,LOW'
trivyignores: '.trivyignore'
env:
TRIVY_DB_REPOSITORY: 'ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db'

- name: Display Trivy Scan Results
if: failure() # Ensure this step runs regardless of the previous step's outcome
run: |
echo "Trivy Scan Results:"
cat trivy-docker-results.json | jq '.Results[] | select(.Vulnerabilities != null) | .Vulnerabilities[] | {VulnerabilityID, PkgName, InstalledVersion, Severity, Description}'
- name: Upload Docker Vulnerability Scan
uses: actions/upload-artifact@v4
with:
Expand Down
2 changes: 2 additions & 0 deletions .trivyignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
# Accept the risk
CVE-2025-0395

0 comments on commit a64af0b

Please sign in to comment.