Replies: 1 comment 2 replies
-
Hi @obounaim ! I'll take a look |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Description
I believe that Trivy is generating an incorrect SARIF file. This issue affects the ability to properly integrate the results into Github advanced security. This issue occurs when we scan GCP's Terraform resources.
Environment:
Github error:
Original Github Issue: 408
have noticed that some uri fields are missing from the SARIF file, could this be the cause of the upload problem? Example bellow :
Regards,
Desired Behavior
The generate SARIF should not get rejected by Github. It works for AWS Terraform resources, but when we scan GCP Terraform resources Github rejects the SARIF file.
Actual Behavior
The generate SARIF should not get rejected by Github. It works for AWS Terraform resources, but when we scan GCP Terraform resources Github rejects the SARIF file.
Reproduction Steps
1. Scan GCP terraform resources, and generate the results in a SARIF file 2. Upload the SARIF file to Github Advance Security
Target
None
Scanner
Misconfiguration
Output Format
SARIF
Mode
Standalone
Debug Output
Operating System
Ubuntu 22.04.5
Version
Checklist
trivy clean --all
Beta Was this translation helpful? Give feedback.
All reactions