-
Notifications
You must be signed in to change notification settings - Fork 197
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Vulnerability scan using Trivy fs scan command #872
Conversation
0241e7f
to
15f5ec7
Compare
Codecov Report
@@ Coverage Diff @@
## main #872 +/- ##
==========================================
- Coverage 65.02% 64.89% -0.13%
==========================================
Files 59 59
Lines 6679 6982 +303
==========================================
+ Hits 4343 4531 +188
- Misses 1886 1997 +111
- Partials 450 454 +4
Continue to review full report at Codecov.
|
6d4b155
to
77d9918
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @deven0t It's a good start. See my comments and let me know wdyt?
857e668
to
41107fe
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👋 @deven0t Overall the changes look good to me! I left a few more comments to consider. Let's catch up and discuss before we merge this PR.
``trivy.command: fs`` will change the trivy scan option to pick up vulnerability scans using trivy fs scan command This is the implementation of approach suggested here aquasecurity#830
41107fe
to
c2c8b13
Compare
trivy.command: fs
will change the trivy scan option to pick up vulnerability scansusing trivy fs scan command
This is the implementation of first approach suggested here #830