Skip to content

ci(deps): bump thollander/actions-comment-pull-request from b07c7f86be67002023e6cb13f57df3f21cdd3411 to e4a76dd2b0a3c2027c3fd84147a67c22ee4c90fa #2599

ci(deps): bump thollander/actions-comment-pull-request from b07c7f86be67002023e6cb13f57df3f21cdd3411 to e4a76dd2b0a3c2027c3fd84147a67c22ee4c90fa

ci(deps): bump thollander/actions-comment-pull-request from b07c7f86be67002023e6cb13f57df3f21cdd3411 to e4a76dd2b0a3c2027c3fd84147a67c22ee4c90fa #2599

Status Failure
Total duration 2m 47s
Artifacts 7

sec-checks.yaml

on: pull_request
Trivy fs scan
31s
Trivy fs scan
Grype fs scan
16s
Grype fs scan
govulncheck fs scan
1m 4s
govulncheck fs scan
govulncheck binary scan
1m 59s
govulncheck binary scan
Matrix: Grype docker image scan
Matrix: Trivy docker image scan
Fit to window
Zoom out
Zoom in

Annotations

5 errors
govulncheck fs scan
Process completed with exit code 1.
govulncheck fs scan
helm.runInstall calls action.ChartPathOptions.LocateChart, which eventually calls nistec.P256Point.ScalarBaseMult
govulncheck fs scan
helm.runInstall calls action.ChartPathOptions.LocateChart, which eventually calls nistec.P256Point.ScalarMult
govulncheck fs scan
utils.getCertificateInfo calls x509.ParseCertificate, which eventually calls nistec.P256Point.SetBytes
Grype docker image scan (Dockerfile)
Failed minimum severity level. Found vulnerabilities with level 'low' or higher

Artifacts

Produced during runtime
Name Size
Checkmarx~kics~KCJNQ2.dockerbuild
101 KB
Checkmarx~kics~P8PSVQ.dockerbuild
100 KB
binary-dependencies
11.1 KB
govulncheck-binary-scan-results
3.75 KB
govulncheck-fs-scan-results
4.43 KB
trivy-docker-image-scan-results
1005 Bytes
trivy-fs-scan-results
138 Bytes