diff --git a/.github/workflows/license_scan.yml b/.github/workflows/license_scan.yml index 6e7cb7b7b..729fa50d6 100644 --- a/.github/workflows/license_scan.yml +++ b/.github/workflows/license_scan.yml @@ -14,6 +14,8 @@ jobs: - name: Run license scanner uses: aquasecurity/trivy-action@0.24.0 + env: + TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2 with: scan-type: "rootfs" scan-ref: "." @@ -34,6 +36,8 @@ jobs: run: cd extensions/wrapper/clients/typescript-client-example && npm clean-install - name: Run license scanner uses: aquasecurity/trivy-action@0.24.0 + env: + TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2 with: scan-type: "repo" scan-ref: "." diff --git a/.github/workflows/secret_scan.yml b/.github/workflows/secret_scan.yml index a06413b54..0f1d746fb 100644 --- a/.github/workflows/secret_scan.yml +++ b/.github/workflows/secret_scan.yml @@ -18,6 +18,8 @@ jobs: uses: actions/checkout@v4 - name: Run vulnerability scanner uses: aquasecurity/trivy-action@0.24.0 + env: + TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2 with: scan-type: "fs" exit-code: "1" diff --git a/.github/workflows/security_scan.yml b/.github/workflows/security_scan.yml index 3df11ce8d..7442741ad 100644 --- a/.github/workflows/security_scan.yml +++ b/.github/workflows/security_scan.yml @@ -13,6 +13,8 @@ jobs: uses: actions/checkout@v4 - name: Run static analysis (rootfs) uses: aquasecurity/trivy-action@0.24.0 + env: + TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2 with: scan-type: "rootfs" scanners: "vuln,misconfig" @@ -29,6 +31,8 @@ jobs: uses: actions/checkout@v4 - name: Run static analysis (repo) uses: aquasecurity/trivy-action@0.24.0 + env: + TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2 with: scan-type: "repo" scanners: "vuln,misconfig" diff --git a/.github/workflows/trivy.yml b/.github/workflows/trivy.yml index 85c4b8d10..4c75748ff 100644 --- a/.github/workflows/trivy.yml +++ b/.github/workflows/trivy.yml @@ -16,6 +16,8 @@ jobs: - name: Run static analysis uses: aquasecurity/trivy-action@0.24.0 + env: + TRIVY_DB_REPOSITORY: public.ecr.aws/aquasecurity/trivy-db:2 with: scan-type: 'fs' security-checks: 'vuln,secret,config'