You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+25-37Lines changed: 25 additions & 37 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,21 +10,16 @@ An active AWS account is required to use this action.
10
10
11
11
## Overview
12
12
13
-
This action works by first generating a CycloneDX software bill of materials (SBOM) for the provided artifact.
13
+
This action works by first generating a CycloneDX software bill of materials (SBOM) for the provided artifact. The SBOM is then sent to Amazon Inspector and scanned for known vulnerabilities.
14
14
15
-
The SBOM is then sent to Amazon Inspector. Inspector scans the provided SBOM for known vulnerabilities, and returns its
16
-
results to the calling action.
17
-
18
-
This action can scan the following artifact types for software vulnerabilities:
15
+
This action can scan the following artifact types for vulnerabilities:
19
16
20
17
1. Files and directories in your GitHub repository
21
18
2. Container images
22
19
3. Compiled Go and Rust binaries (*stripped and obfuscated binaries are not supported*)
23
20
4. Archives *(.zip, .tar, .tar.gz)*
24
21
25
-
To learn more about this action's supported artifacts, please see our documentation
For more information, please refer to Amazon Inspector's supported [artifacts](https://docs.aws.amazon.com/inspector/latest/user/sbom-generator.html) and [container operating systems](https://docs.aws.amazon.com/inspector/latest/user/supported.html#supported-os-ecr).
28
23
29
24
## Prerequisites
30
25
@@ -66,13 +61,13 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
66
61
jobs:
67
62
daily_job:
68
63
runs-on: ubuntu-latest
69
-
64
+
70
65
# change this to match your GitHub Secrets environment
71
66
environment:
72
67
name: your_github_secrets_environment
73
-
68
+
74
69
steps:
75
-
70
+
76
71
# modify this block based on how you authenticate to AWS
77
72
# make sure you have permission to access the Inspector ScanSbom API
# This step illustrates how to add custom logic if
151
146
# the vulnerability threshold is exceeded. This example
152
147
# simply prints the 'vulnerability_threshold_exceeded' value
@@ -165,16 +160,9 @@ For additional examples, see [this repository's workflow definitions](.github/wo
165
160
166
161
### Configuring Vulnerability Scan Outputs
167
162
168
-
This action provides detailed Inspector scan findings in JSON, CSV, and markdown, as well as a CycloneDX software bill
169
-
of
170
-
materials in JSON.
171
-
172
-
By default, this action will only display the number of vulnerabilities detected in the GitHub Actions job terminal.
173
-
Detailed vulnerability findings are not shown by design.
174
-
175
-
This is done so **you** can control how and where your vulnerability findings are presented and stored.
163
+
By default, this action only displays the number of vulnerabilities detected in the GitHub Actions job terminal. Detailed findings are optional and configurable as JSON, CSV, or Markdown. In addition, an artifact inventory is available as a CycloneDX JSON file.
176
164
177
-
The example below shows how to present this action's outputs in various locations and formats.
165
+
The below example shows how to enable action outputs in various locations and formats.
178
166
179
167
**Exercise caution to ensure you do not accidentally post vulnerability information to untrusted viewers.**
0 commit comments