diff --git a/.github/workflows/scan-vulns.yaml b/.github/workflows/scan-vulns.yaml index d15d71fb2..dcc4f2345 100644 --- a/.github/workflows/scan-vulns.yaml +++ b/.github/workflows/scan-vulns.yaml @@ -37,8 +37,6 @@ jobs: name: "[Trivy] Scan for vulnerabilities" runs-on: ubuntu-22.04 timeout-minutes: 15 - env: - TRIVY_VERSION: "0.46.0" steps: - name: Harden Runner uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1 @@ -55,7 +53,6 @@ jobs: scan-ref: '.' ignore-unfixed: true scanners: 'vuln' - version: ${{ env.TRIVY_VERSION }} - name: Build docker images run: | @@ -68,7 +65,6 @@ jobs: scan-type: 'image' image-ref: 'localbuild:test' ignore-unfixed: true - version: ${{ env.TRIVY_VERSION }} - name: Run Trivy vulnerability scanner on localbuildcrd:test uses: aquasecurity/trivy-action@5681af892cd0f4997658e2bacc62bd0a894cf564 # 0.27.0 @@ -76,7 +72,6 @@ jobs: scan-type: 'image' image-ref: 'localbuildcrd:test' ignore-unfixed: true - version: ${{ env.TRIVY_VERSION }} - name: Run Trivy vulnerability scanner on localbuild:test and exit on HIGH severity uses: aquasecurity/trivy-action@5681af892cd0f4997658e2bacc62bd0a894cf564 # 0.27.0 @@ -86,7 +81,6 @@ jobs: ignore-unfixed: true severity: 'HIGH,CRITICAL' exit-code: '1' - version: ${{ env.TRIVY_VERSION }} - name: Run Trivy vulnerability scanner on localbuildcrd:test and exit on HIGH severity uses: aquasecurity/trivy-action@5681af892cd0f4997658e2bacc62bd0a894cf564 # 0.27.0 @@ -96,4 +90,3 @@ jobs: ignore-unfixed: true severity: 'HIGH,CRITICAL' exit-code: '1' - version: ${{ env.TRIVY_VERSION }}