chore(deps): bump github/codeql-action from 2.21.0 to 2.21.4 #313
Annotations
1 warning
linter:
.github/workflows/vulnerability-scan.yml#L1
[MegaLinter] reported by reviewdog 🐶
Raw Output:
.github/workflows/vulnerability-scan.yml:1:----
.github/workflows/vulnerability-scan.yml:2:-name: Vulnerability Scan
.github/workflows/vulnerability-scan.yml:3:-
.github/workflows/vulnerability-scan.yml:4:-on:
.github/workflows/vulnerability-scan.yml:5:- schedule:
.github/workflows/vulnerability-scan.yml:6:- - cron: "30 2 * * *"
.github/workflows/vulnerability-scan.yml:7:- workflow_dispatch:
.github/workflows/vulnerability-scan.yml:8:-
.github/workflows/vulnerability-scan.yml:9:-permissions: {}
.github/workflows/vulnerability-scan.yml:10:-
.github/workflows/vulnerability-scan.yml:11:-jobs:
.github/workflows/vulnerability-scan.yml:12:- vulnerability-scan:
.github/workflows/vulnerability-scan.yml:13:- runs-on: ubuntu-latest
.github/workflows/vulnerability-scan.yml:14:- permissions:
.github/workflows/vulnerability-scan.yml:15:- security-events: write
.github/workflows/vulnerability-scan.yml:16:- steps:
.github/workflows/vulnerability-scan.yml:17:- - uses: crazy-max/ghaction-container-scan@cdc6facb764848d60ab7ea4b7cbaac409140e37d # v2.1.0
.github/workflows/vulnerability-scan.yml:18:- id: scan
.github/workflows/vulnerability-scan.yml:19:- with:
.github/workflows/vulnerability-scan.yml:20:- image: ghcr.io/${{ github.repository }}:latest
.github/workflows/vulnerability-scan.yml:21:- dockerfile: .devcontainer/Dockerfile
.github/workflows/vulnerability-scan.yml:1:+---
.github/workflows/vulnerability-scan.yml:2:+name: Vulnerability Scan
.github/workflows/vulnerability-scan.yml:3:+
.github/workflows/vulnerability-scan.yml:4:+on:
.github/workflows/vulnerability-scan.yml:5:+ schedule:
.github/workflows/vulnerability-scan.yml:6:+ - cron: "30 2 * * *"
.github/workflows/vulnerability-scan.yml:7:+ workflow_dispatch:
.github/workflows/vulnerability-scan.yml:8:+
.github/workflows/vulnerability-scan.yml:9:+permissions: {}
.github/workflows/vulnerability-scan.yml:10:+
.github/workflows/vulnerability-scan.yml:11:+jobs:
.github/workflows/vulnerability-scan.yml:12:+ vulnerability-scan:
.github/workflows/vulnerability-scan.yml:13:+ runs-on: ubuntu-latest
.github/workflows/vulnerability-scan.yml:14:+ permissions:
.github/workflows/vulnerability-scan.yml:15:+ security-events: write
.github/workflows/vulnerability-scan.yml:16:+ steps:
.github/workflows/vulnerability-scan.yml:17:+ - uses: crazy-max/ghaction-container-scan@cdc6facb764848d60ab7ea4b7cbaac409140e37d # v2.1.0
.github/workflows/vulnerability-scan.yml:18:+ id: scan
.github/workflows/vulnerability-scan.yml:19:+ with:
.github/workflows/vulnerability-scan.yml:20:+ image: ghcr.io/${{ github.repository }}:latest
.github/workflows/vulnerability-scan.yml:21:+ dockerfile: .devcontainer/Dockerfile
|
Artifacts
Produced during runtime
Name | Size | |
---|---|---|
Linter Report
Expired
|
70.3 KB |
|