security.yml 986 B

1234567891011121314151617181920212223242526272829303132333435363738394041424344
  1. ---
  2. name: Security
  3. # yamllint disable-line rule:truthy
  4. on:
  5. workflow_dispatch:
  6. schedule:
  7. - cron: "42 05 * * *"
  8. concurrency:
  9. group: ${{ github.workflow }}
  10. cancel-in-progress: false
  11. permissions:
  12. contents: read
  13. jobs:
  14. container:
  15. if: github.repository_owner == 'searxng'
  16. name: Container
  17. runs-on: ubuntu-24.04-arm
  18. permissions:
  19. security-events: write
  20. steps:
  21. - name: Checkout
  22. uses: actions/checkout@v4
  23. with:
  24. persist-credentials: "false"
  25. - name: Run Trivy scanner
  26. uses: aquasecurity/trivy-action@0.30.0
  27. with:
  28. image-ref: "ghcr.io/searxng/searxng:latest"
  29. vuln-type: "os,library"
  30. severity: "UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL"
  31. ignore-unfixed: "false"
  32. format: "sarif"
  33. output: "./trivy-results.sarif"
  34. - name: Upload SARIFs
  35. uses: github/codeql-action/upload-sarif@v3
  36. with:
  37. sarif_file: "./trivy-results.sarif"