From 94217bd6c76195194e401b7d21d18058b7d0fde0 Mon Sep 17 00:00:00 2001 From: rvazarkar Date: Fri, 20 Mar 2026 13:51:17 -0400 Subject: [PATCH] fix: nuke trivy after compromise https://specterops.atlassian.net/browse/BED-7720 --- .github/workflows/vuln-scan.yml | 29 ----------------------------- 1 file changed, 29 deletions(-) delete mode 100644 .github/workflows/vuln-scan.yml diff --git a/.github/workflows/vuln-scan.yml b/.github/workflows/vuln-scan.yml deleted file mode 100644 index e0cc8007..00000000 --- a/.github/workflows/vuln-scan.yml +++ /dev/null @@ -1,29 +0,0 @@ -name: Vulnerability Scan - -on: - pull_request: - branches: - - v* - types: - - opened - - synchronize - -jobs: - run-analysis: - runs-on: ubuntu-latest - - steps: - - name: Checkout source code for this repository - uses: actions/checkout@v4 - - - name: Run vulnerability scanner - uses: aquasecurity/trivy-action@0.34.2 - with: - scan-type: "repo" - scan-ref: "./" - severity: "CRITICAL,HIGH" - exit-code: "1" - ignore-unfixed: true - env: - TRIVY_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db - TRIVY_JAVA_DB_REPOSITORY: ghcr.io/aquasecurity/trivy-java-db,public.ecr.aws/aquasecurity/trivy-java-db