security.yml 786 B

1234567891011121314151617181920212223242526272829
  1. name: "Security checks"
  2. on: # yamllint disable-line rule:truthy
  3. schedule:
  4. - cron: "42 05 * * *"
  5. workflow_dispatch:
  6. jobs:
  7. dockers:
  8. name: Trivy ${{ matrix.image }}
  9. runs-on: ubuntu-24.04
  10. steps:
  11. - name: Checkout
  12. uses: actions/checkout@v4
  13. - name: Run Trivy vulnerability scanner
  14. uses: aquasecurity/trivy-action@master
  15. with:
  16. image-ref: 'searxng/searxng:latest'
  17. ignore-unfixed: false
  18. vuln-type: 'os,library'
  19. severity: 'UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL'
  20. format: 'sarif'
  21. output: 'trivy-results.sarif'
  22. - name: Upload Trivy scan results to GitHub Security tab
  23. uses: github/codeql-action/upload-sarif@v2
  24. with:
  25. sarif_file: 'trivy-results.sarif'