Grype Container Scanner
Grype Container Scanner - Reusable Workflow
THIN WRAPPER: This workflow delegates to the scanner-container composite action. All scanning logic is in: .github/actions/scanner-container/action.yml
For GHES users: Use the composite action directly instead of this workflow. See: examples/github-enterprise/container-scanning.yml
uses: huntridge-labs/argus/.github/workflows/scanner-grype.yml@0.6.7
Triggers
- Manual dispatch
- Reusable (called by other workflows)
Permissions
| Scope | Access |
|---|---|
contents |
read |
security-events |
write |
actions |
read |
pull-requests |
write |
packages |
read |
Inputs
| Input | Description | Required | Default |
|---|---|---|---|
image_ref |
Container image reference to scan (e.g., nginx:latest, ghcr.io/owner/image:tag) string | Yes | โ |
scan_name |
Name for the scan artifacts string | No | container |
registry_username |
Username for registry authentication (leave empty for public images) string | No | โ |
enable_code_security |
Whether to upload SARIF to GitHub Security boolean | No | False |
post_pr_comment |
Whether to post PR comments boolean | No | False |
fail_on_severity |
Fail the job if vulnerabilities at or above this severity are found. Options: none, low, medium, high, critical. Set ... string | No | none |
Secrets
| Secret | Description | Required |
|---|---|---|
registry_password |
Password/token for registry authentication | No |
Jobs
grype-container-scan โ Grype Container Scan
Runs on: ubuntu-latest ยท Timeout: 20 minutes ยท Continue on error: Yes
Steps:
- Checkout repository โ
actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd - Run Grype Scanner โ
huntridge-labs/argus/.github/actions/scanner-container@0.6.7
Actions used:
- ๐ฆ
scanner-containerโ Container Security Scanner
All Composite Actions Referenced
- ๐ฆ
scanner-containerโ Container Security Scanner