Skip to content

ci: add container scanning to default checks #1091

ci: add container scanning to default checks

ci: add container scanning to default checks #1091

Triggered via pull request November 10, 2023 06:27
Status Failure
Total duration 44s
Artifacts

commitlint-pull-request.yaml

on: pull_request
commitlint
22s
commitlint
Fit to window
Zoom out
Zoom in

Annotations

1 error
commitlint
You have commit messages with errors ⧗ input: Trivy is a cutting-edge security tool designed to enhance the safety of containerized applications by conducting thorough vulnerability assessments. Specifically developed for scanning container images, ranging from low-severity issues to critical threats. It employs an intelligent rating system to categorize vulnerabilities based on their severity levels, ensuring that high to critical vulnerabilities are given special attention. Upon detecting vulnerabilities that fall within this elevated range, Trivy will throw an error. By integrating Trivy into our deployment pipeline, we can proactively mitigate security risks and enhance the resilience of our repository. Fixes hyperledger#1876 Depends On: hyperledger#2865 Depends On: hyperledger#2864 Depends On: hyperledger#2863 Depends On: hyperledger#2862 Signed-off-by: zondervancalvez <[email protected]> ✖ subject may not be empty [subject-empty] ✖ type may not be empty [type-empty] ⚠ body must have leading blank line [body-leading-blank] ✖ found 2 problems, 1 warnings ⓘ Get help: https://github.com/conventional-changelog/commitlint/#what-is-commitlint