chore: Bump github/codeql-action from 3.26.11 to 3.26.12 (#1856) #113
scan-vulns.yaml
on: push
Run govulncheck
53s
[Trivy] Scan for vulnerabilities
2m 15s
Annotations
11 errors and 1 warning
Run govulncheck
cosign.trustPolicy.GetCosignOpts calls cosign.GetRekorPubs, which eventually calls client.Client.Download
|
Run govulncheck
config.GetDefaultPluginPath calls sync.Once.Do, which eventually calls client.Client.Init
|
Run govulncheck
cosign.trustPolicy.GetCosignOpts calls cosign.GetRekorPubs, which eventually calls client.Client.Target
|
Run govulncheck
cosign.trustPolicy.GetCosignOpts calls cosign.GetRekorPubs, which eventually calls client.Client.Targets
|
Run govulncheck
cosign.trustPolicy.GetCosignOpts calls cosign.GetRekorPubs, which eventually calls client.Client.Update
|
Run govulncheck
oras.orasStore.GetReferenceManifest calls client.ErrDecodeFailed.Error
|
Run govulncheck
oras.orasStore.GetReferenceManifest calls client.ErrDownloadFailed.Error
|
Run govulncheck
oras.orasStore.GetReferenceManifest calls client.ErrInvalidURL.Error
|
Run govulncheck
oras.orasStore.GetReferenceManifest calls client.ErrMaxDelegations.Error
|
Run govulncheck
oras.orasStore.GetReferenceManifest calls client.ErrMetaTooLarge.Error
|
[Trivy] Scan for vulnerabilities
Process completed with exit code 1.
|
Run govulncheck
Restore cache failed: Dependencies file is not found in /home/runner/work/ratify/ratify. Supported file pattern: go.sum
|