diff --git a/.github/workflows/docker-vulnerabilities.yaml b/.github/workflows/docker-vulnerabilities.yaml index 500e6be..bf2be68 100644 --- a/.github/workflows/docker-vulnerabilities.yaml +++ b/.github/workflows/docker-vulnerabilities.yaml @@ -3,6 +3,7 @@ on: schedule: # At the end of every day - cron: "0 0 * * *" + pull_request: jobs: docker-analysis: @@ -69,7 +70,7 @@ jobs: DOCKER_TAG: analysis-latest - name: Scan vulnerabilities app image - uses: aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2 # v0.28.0 + uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # v0.29.0 with: image-ref: 'pantosio/service-node-app:analysis-latest' format: 'sarif' @@ -85,7 +86,7 @@ jobs: sarif_file: 'trivy-app-results.sarif' - name: Scan vulnerabilities worker image - uses: aquasecurity/trivy-action@915b19bbe73b92a6cf82a1bc12b087c9a19a5fe2 # v0.28.0 + uses: aquasecurity/trivy-action@18f2510ee396bbf400402947b394f2dd8c87dbb0 # v0.29.0 with: image-ref: 'pantosio/service-node-worker:analysis-latest' format: 'sarif'