aquasecurity/setup-trivy
Set up your GitHub Actions workflow with a specific version of Trivy
Composite Action Details
Pinnable | Yes |
GitHub Actions security score
| aquasecurity/setup-trivy | |
|---|---|
Score | 5/10 |
License | Apache License 2.0 |
Maintained | 5 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 4 |
Vulnerabilities | 0 existing vulnerabilities detected |
Branch protection | branch protection not enabled on development/release branches |
Manual code review | - |
Secure publishing | - |
Signed commits | - |
Automated security tools | - |
Popular | Used by 388 open-source projects |
Security Policy | security policy file not detected |
Networking Behavior of aquasecurity/setup-trivy
This GitHub Action often makes outbound network calls to these destinations, as gathered from public workflows using the Harden-Runner GitHub Action. Harden-Runner offers network egress filtering and runtime security for both GitHub-hosted and self-hosted runners.
Popular DestinationUnknown Destination
| Network Destination | Owner |
|---|---|
| api.github.com | |
| github.com | |
| objects.githubusercontent.com | |
| ghcr.io | |
| pkg-containers.githubusercontent.com | |
| public.ecr.aws | Unknown |
| d2glxqk2uabbnd.cloudfront.net | Unknown |
| d5l0dvt14r5h8.cloudfront.net | Unknown |
| mirror.gcr.io | Unknown |
| check.trivy.dev | Unknown |
| us-v20.events.data.microsoft.com | |
| winatp-gw-cus.microsoft.com | |
| unitedstates.cp.wd.microsoft.com | |
| release-assets.githubusercontent.com | |
| quay.io | Unknown |
| cdn01.quay.io | Unknown |
| tuf-repo-cdn.sigstore.dev | |
| fulcio.sigstore.dev | |
| rekor.sigstore.dev | |
| timestamp.sigstore.dev | |
| sts.googleapis.com | |
| iamcredentials.googleapis.com | |
| us-west1-docker.pkg.dev | Unknown |
| get.trivy.dev | Unknown |
| scan.aquasecurtiy.org | Unknown |