diff --git a/security-actions/sca/action.yml b/security-actions/sca/action.yml index 4cfe9877..fda5b06e 100644 --- a/security-actions/sca/action.yml +++ b/security-actions/sca/action.yml @@ -119,7 +119,7 @@ runs: fail: true - name: Download Grype - uses: anchore/scan-action/download-grype@v4.1.1 + uses: anchore/scan-action/download-grype@v4.1.2 # Check for any existing cache to reuse - name: Restore Grype DB Cache @@ -190,7 +190,7 @@ runs: # Don't fail during report generation - name: Vulnerability analysis of SBOM - uses: anchore/scan-action@v4.1.1 + uses: anchore/scan-action@v4.1.2 id: grype_analysis_sarif if: ${{ steps.sbom_report.outputs.files_exists == 'true' && steps.grype_db_check_updates.outputs.GRYPE_DB_UPDATE_STATUS == 0 }} # Run only if DB is available on the runner }} with: @@ -203,7 +203,7 @@ runs: # Don't fail during report generation # JSON format will report any ignored rules - name: Vulnerability analysis of SBOM - uses: anchore/scan-action@v4.1.1 + uses: anchore/scan-action@v4.1.2 id: grype_analysis_json if: ${{ steps.sbom_report.outputs.files_exists == 'true' && steps.grype_db_check_updates.outputs.GRYPE_DB_UPDATE_STATUS == 0 }} # Run only if DB is available on the runner}} with: @@ -255,7 +255,7 @@ runs: # Notify grype quick scan results in table format # Table format will supress any specified ignore rules - name: Inspect Vulnerability analysis of SBOM - uses: anchore/scan-action@v4.1.1 + uses: anchore/scan-action@v4.1.2 if: ${{ steps.sbom_report.outputs.files_exists == 'true' && steps.grype_db_check_updates.outputs.GRYPE_DB_UPDATE_STATUS == 0 }} with: sbom: ${{ steps.meta.outputs.sbom_spdx_file }}