Skip to content
This repository was archived by the owner on Jan 24, 2025. It is now read-only.

Commit 5f08351

Browse files
authored
Update README.md
1 parent 5f38cf2 commit 5f08351

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

README.md

+6-1
Original file line numberDiff line numberDiff line change
@@ -205,12 +205,17 @@ Vulnerability thresholds can be used to support custom logic, such as failing th
205205

206206
### Input Options
207207

208-
| **Name** | **Description** | **Required** | **Default** |
208+
| Name** | **Description** | **Required** | **Default** |
209209
| ------------------------------ | ------------------------------------------------------------ | ------------ | ----------- |
210210
| aws-access-key-id | AWS Access Key ID for accessing Amazon Inspector | True | - |
211211
| aws-secret-access-key | AWS Secret Access Key for accessing Amazon Inspector | True | - |
212212
| aws-region | AWS Region where your EC2 instances are located | True | - |
213213
| assessment-run-arn | Amazon Inspector Assessment Run ARN | True | - |
214+
| agentless | Specifies if the scan should be agentless (true/false) | False | false |
215+
| jira-url | Jira URL for creating tickets (optional) | False | - |
216+
| jira-username | Jira Username for creating tickets (optional) | False | - |
217+
| jira-api-token | Jira API Token for creating tickets (optional) | False | - |
218+
| jira-project-key | Jira Project Key for creating tickets (optional) | False | - |
214219
| display_vulnerability_findings | If set to "enabled", the action will display detailed vulnerability findings in the action summary page | True | disabled |
215220
| critical_threshold | Specifies the number of critical vulnerabilities needed to set the 'vulnerability_threshold_exceeded' flag | False | 0 |
216221
| high_threshold | Specifies the number of high vulnerabilities needed to set the 'vulnerability_threshold_exceeded' flag | False | 0 |

0 commit comments

Comments
 (0)