Skip to content

Commit

Permalink
Add CVE scan pipeline as scheduled nightly
Browse files Browse the repository at this point in the history
The new 'CVE scan' pipeline scans the latest published
image for high & critical vulnerabilities.

closes #224
  • Loading branch information
abelsromero committed Feb 5, 2022
1 parent 98ebbdb commit 0c05809
Show file tree
Hide file tree
Showing 2 changed files with 24 additions and 0 deletions.
2 changes: 2 additions & 0 deletions .github/containerscan/allowedlist.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
general:
vulnerabilities: [] # List of excluded CVEs (e.g: CVE-2021-3711)
22 changes: 22 additions & 0 deletions .github/workflows/cve-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
name: "CVE Scan"
on:
schedule:
- cron: '0 0 * * *'
workflow_dispatch: { }
jobs:
scan-images:
name: Scan latest public image
runs-on: ubuntu-latest
strategy:
matrix:
image: [ docker-asciidoctor ]
tag: [ latest ]
steps:
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: 'docker.io/asciidoctor/${{ matrix.image }}:${{ matrix.tag }}'
severity: 'CRITICAL,HIGH'
format: 'table'
# we can set to 0 to avoid breaking the pipeline
exit-code: '1'

0 comments on commit 0c05809

Please sign in to comment.