Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ci: add container scanning to default checks #2

Closed
wants to merge 2 commits into from

Commits on Sep 8, 2023

  1. ci: add container scanning to default checks

    Trivy is a cutting-edge security tool designed to enhance
    the safety of containerized applications by conducting thorough
    vulnerability assessments. Specifically developed for scanning
    container images, ranging from low-severity issues to critical
    threats. It employs an intelligent rating system to categorize
    vulnerabilities based on their severity levels, ensuring that
    high to critical vulnerabilities are given special attention.
    Upon detecting vulnerabilities that fall within this elevated
    range, Trivy will throw an error.
    
    By integrating Trivy into our deployment pipeline, we can
    proactively mitigate security risks and enhance the resilience
    of our repository.
    
    Fixes hyperledger-cacti#1876
    
    Depends On: hyperledger-cacti#2121
    Depends On: hyperledger-cacti#2135
    
    Signed-off-by: zondervancalvez <zondervan.v.calvez@accenture.com>
    zondervancalvez authored and adrianbatuto committed Sep 8, 2023
    Configuration menu
    Copy the full SHA
    4d37de3 View commit details
    Browse the repository at this point in the history
  2. fix(security): vulnerabilities found in corda-4-8-all-in-one

    Fixes hyperledger-cacti#2064
    
    Signed-off-by: adrianbatuto <adrian.batuto@accenture.com>
    adrianbatuto committed Sep 8, 2023
    Configuration menu
    Copy the full SHA
    53e6773 View commit details
    Browse the repository at this point in the history