diff --git a/.github/workflows/serverless-init-vulnerability-scan.yml b/.github/workflows/serverless-init-vulnerability-scan.yml index a7570ee9a..cf9ba9190 100644 --- a/.github/workflows/serverless-init-vulnerability-scan.yml +++ b/.github/workflows/serverless-init-vulnerability-scan.yml @@ -16,7 +16,7 @@ jobs: runs-on: ubuntu-22.04 steps: - name: Scan latest serverless-init image with trivy - uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0 + uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1 with: image-ref: "datadog/serverless-init:latest" ignore-unfixed: true @@ -24,7 +24,7 @@ jobs: format: table - name: Scan latest-alpine serverless-init image with trivy - uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0 + uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1 with: image-ref: "datadog/serverless-init:latest-alpine" ignore-unfixed: true diff --git a/.github/workflows/vulnerability-scan.yml b/.github/workflows/vulnerability-scan.yml index b9cfa554b..b936779bb 100644 --- a/.github/workflows/vulnerability-scan.yml +++ b/.github/workflows/vulnerability-scan.yml @@ -17,7 +17,7 @@ jobs: runs-on: ubuntu-22.04 steps: - name: Scan latest released image with trivy - uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0 + uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1 with: image-ref: "public.ecr.aws/datadog/lambda-extension:latest" ignore-unfixed: true @@ -25,7 +25,7 @@ jobs: format: table - name: Scan latest-alpine released image with trivy - uses: aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0 + uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1 with: image-ref: "public.ecr.aws/datadog/lambda-extension:latest-alpine" ignore-unfixed: true