@@ -58,22 +58,25 @@ jobs:
58
58
path : trivy-dependency-results.sbom.json
59
59
retention-days : 30
60
60
61
- - name : Run Trivy Image scanner
62
- uses : aquasecurity/trivy-action@0.24.0
63
- with :
64
- scan-type : ' image'
65
- image-ref : ' georgedavisibexlabs/publish-sarif-to-jira:build'
66
- limit-severities-for-sarif : true
67
- trivy-config : .github/config/trivy-sarif.yaml
61
+ - name : List Docker Images
62
+ run : ' docker ps -a'
68
63
69
- - name : Upload Trivy Image scan results
70
- uses : actions/upload-artifact@v4.3.6
71
- with :
72
- name : trivy-image-scan-results
73
- path : trivy-image-scan-results.sarif
74
- retention-days : 30
64
+ # - name: Run Trivy Image scanner
65
+ # uses: aquasecurity/trivy-action@0.24.0
66
+ # with:
67
+ # scan-type: 'image'
68
+ # image-ref: 'georgedavisibexlabs/publish-sarif-to-jira'
69
+ # limit-severities-for-sarif: true
70
+ # trivy-config: .github/config/trivy-sarif.yaml
71
+
72
+ # - name: Upload Trivy Image scan results
73
+ # uses: actions/upload-artifact@v4.3.6
74
+ # with:
75
+ # name: trivy-image-scan-results
76
+ # path: trivy-image-scan-results.sarif
77
+ # retention-days: 30
75
78
76
- - name : Upload Trivy scan results to GitHub Security tab
77
- uses : github/codeql-action/upload-sarif@v3
78
- with :
79
- sarif_file : ' trivy-image-scan-results.sarif'
79
+ # - name: Upload Trivy scan results to GitHub Security tab
80
+ # uses: github/codeql-action/upload-sarif@v3
81
+ # with:
82
+ # sarif_file: 'trivy-image-scan-results.sarif'
0 commit comments