Skip to content

Setup security workflow that tests CVEs in the docker image on change #234

@hydrapolic

Description

@hydrapolic

Currently, our trivy job runs but might not be able to detect CVEs in our docker image prior to publishing it.

For example, while our security workflow passes, trivy image openzipkin/zipkin-gcp:2.3 fails with a high severity issue on alpine packages.

To solve this, let's make a new workflow called security-docker based on the security one.

This workflow should fail similar to running ad-hoc. Assuming it does, lets do something similar in the docker-java and docker-alpine repos so that they also run trivy only after building the image.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions