Skip to content

Trivy Container Scanner

Trivy Container Scanner - Reusable Workflow

THIN WRAPPER: This workflow delegates to the scanner-container composite action. All scanning logic is in: .github/actions/scanner-container/action.yml

For GHES users: Use the composite action directly instead of this workflow. See: examples/github-enterprise/container-scanning.yml

uses: huntridge-labs/argus/.github/workflows/scanner-trivy-container.yml@0.6.7

Triggers

  • Manual dispatch
  • Reusable (called by other workflows)

Permissions

Scope Access
contents read
security-events write
actions read
pull-requests write
packages read

Inputs

Input Description Required Default
image_ref Container image reference to scan (e.g., nginx:latest, ghcr.io/owner/image:tag) string Yes โ€”
scan_name Name for the scan artifacts string No container
registry_username Username for registry authentication (leave empty for public images) string No โ€”
enable_code_security Whether to upload SARIF to GitHub Security boolean No False
post_pr_comment Whether to post PR comments boolean No False
fail_on_severity Fail the job if vulnerabilities at or above this severity are found. Options: none, low, medium, high, critical. Set ... string No none

Secrets

Secret Description Required
registry_password Password/token for registry authentication No

Jobs

trivy-container-scan โ€” Trivy Container Scan

Runs on: ubuntu-latest ยท Timeout: 20 minutes ยท Continue on error: Yes

Steps:

  1. Checkout repository โ€” actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd
  2. Run Trivy Scanner โ€” huntridge-labs/argus/.github/actions/scanner-container@0.6.7

Actions used:

All Composite Actions Referenced