You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+29
Original file line number
Diff line number
Diff line change
@@ -51,6 +51,35 @@ jobs:
51
51
severity: 'CRITICAL,HIGH'
52
52
```
53
53
54
+
55
+
### Scanning a Tarball
56
+
```yaml
57
+
name: build
58
+
on:
59
+
push:
60
+
branches:
61
+
- master
62
+
pull_request:
63
+
jobs:
64
+
build:
65
+
name: Build
66
+
runs-on: ubuntu-20.04
67
+
steps:
68
+
- name: Checkout code
69
+
uses: actions/checkout@v2
70
+
71
+
- name: Generate tarball from image
72
+
run: |
73
+
docker pull <your-docker-image>
74
+
docker save -o vuln-image.tar <your-docker-image>
75
+
76
+
- name: Run Trivy vulnerability scanner in tarball mode
77
+
uses: aquasecurity/trivy-action@master
78
+
with:
79
+
input: /github/workspace/vuln-image.tar
80
+
severity: 'CRITICAL,HIGH'
81
+
```
82
+
54
83
### Using Trivy with GitHub Code Scanning
55
84
If you have [GitHub code scanning](https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/about-code-scanning) available you can use Trivy as a scanning tool as follows:
0 commit comments