Radarr/.github/workflows/trivy.yml
dependabot[bot] 3fbd699546
ci(deps): bump github/codeql-action from 3 to 4 (#129)
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 3 to 4.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/v3...v4)

---
updated-dependencies:
- dependency-name: github/codeql-action
  dependency-version: '4'
  dependency-type: direct:production
  update-type: version-update:semver-major
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2025-12-22 09:20:21 -06:00

41 lines
1,020 B
YAML

# Trivy vulnerability scanner
# Scans for CVEs in filesystem/dependencies and uploads to GitHub Security tab
# Note: Image scanning requires built artifacts, use release workflow for that
name: Trivy Security Scan
on:
push:
branches: [develop, main]
pull_request:
branches: [develop]
schedule:
- cron: '0 6 * * 1' # Weekly on Monday at 6am UTC
permissions:
contents: read
security-events: write
actions: read
jobs:
scan:
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@v6
- name: Run Trivy filesystem scanner
uses: aquasecurity/trivy-action@0.33.1
with:
scan-type: 'fs'
scan-ref: '.'
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
ignore-unfixed: true
- name: Upload Trivy results to GitHub Security
uses: github/codeql-action/upload-sarif@v4
if: always()
with:
sarif_file: 'trivy-results.sarif'