cacti
cacti copied to clipboard
ci: add container scanning to default checks
Trivy is a cutting-edge security tool designed to enhance the safety of containerized applications by conducting thorough vulnerability assessments. Specifically developed for scanning container images, ranging from low-severity issues to critical threats. It employs an intelligent rating system to categorize vulnerabilities based on their severity levels, ensuring that high to critical vulnerabilities are given special attention. Upon detecting vulnerabilities that fall within this elevated range, Trivy will throw an error.
By integrating Trivy into our deployment pipeline, we can proactively mitigate security risks and enhance the resilience of our repository.
Fixes hyperledger#1876
Depends On: hyperledger#2865 Depends On: hyperledger#2864 Depends On: hyperledger#2863 Depends On: hyperledger#2862
Pull Request Requirements
- [x] Rebased onto
upstream/main
branch and squashed into single commit to help maintainers review it more efficient and to avoid spaghetti git commit graphs that obfuscate which commit did exactly what change, when and, why. - [x] Have git sign off at the end of commit message to avoid being marked red. You can add
-s
flag when usinggit commit
command. You may refer to this link for more information. - [x] Follow the Commit Linting specification. You may refer to this link for more information.
Character Limit
- [x] Pull Request Title and Commit Subject must not exceed 72 characters (including spaces and special characters).
- [x] Commit Message per line must not exceed 80 characters (including spaces and special characters).
A Must Read for Beginners For rebasing and squashing, here's a must read guide for beginners.