Skip to content

Commit bfa7cbe

Browse files
authored
update-readme -- add links to supported os, change verbiage around outputs, misc formatting updates (#44)
1 parent 2142a75 commit bfa7cbe

File tree

1 file changed

+25
-37
lines changed

1 file changed

+25
-37
lines changed

README.md

Lines changed: 25 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -10,21 +10,16 @@ An active AWS account is required to use this action.
1010

1111
## Overview
1212

13-
This action works by first generating a CycloneDX software bill of materials (SBOM) for the provided artifact.
13+
This action works by first generating a CycloneDX software bill of materials (SBOM) for the provided artifact. The SBOM is then sent to Amazon Inspector and scanned for known vulnerabilities.
1414

15-
The SBOM is then sent to Amazon Inspector. Inspector scans the provided SBOM for known vulnerabilities, and returns its
16-
results to the calling action.
17-
18-
This action can scan the following artifact types for software vulnerabilities:
15+
This action can scan the following artifact types for vulnerabilities:
1916

2017
1. Files and directories in your GitHub repository
2118
2. Container images
2219
3. Compiled Go and Rust binaries (*stripped and obfuscated binaries are not supported*)
2320
4. Archives *(.zip, .tar, .tar.gz)*
2421

25-
To learn more about this action's supported artifacts, please see our documentation
26-
here: [Amazon Inspector SBOM Generator (inspector-sbomgen)](https://docs.aws.amazon.com/inspector/latest/user/sbom-generator.html)
27-
.
22+
For more information, please refer to Amazon Inspector's supported [artifacts](https://docs.aws.amazon.com/inspector/latest/user/sbom-generator.html) and [container operating systems](https://docs.aws.amazon.com/inspector/latest/user/supported.html#supported-os-ecr).
2823

2924
## Prerequisites
3025

@@ -66,13 +61,13 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
6661
jobs:
6762
daily_job:
6863
runs-on: ubuntu-latest
69-
64+
7065
# change this to match your GitHub Secrets environment
7166
environment:
7267
name: your_github_secrets_environment
73-
68+
7469
steps:
75-
70+
7671
# modify this block based on how you authenticate to AWS
7772
# make sure you have permission to access the Inspector ScanSbom API
7873
# https://docs.aws.amazon.com/inspector/latest/user/configure-cicd-account.html#cicd-iam-role
@@ -81,30 +76,30 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
8176
with:
8277
aws-region: "us-east-1"
8378
role-to-assume: "arn:aws:iam::<AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>"
84-
79+
8580
# Check out your repository if needed
8681
- name: Checkout this repository
8782
uses: actions/checkout@v4
88-
83+
8984
# modify this block to scan your intended artifact
9085
- name: Inspector Scan
9186
id: inspector
9287
uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
9388
with:
9489
# change artifact_type to either 'repository', 'container', 'binary', or 'archive'.
9590
artifact_type: 'repository'
96-
91+
9792
# change artifact_path to the file path or container image you would like to scan.
9893
# File paths should be relative to your root project directory.
9994
# For containers, this action accepts 'docker pull'-style references to containers,
10095
# such as 'alpine:latest' or a file path to an image exported as TAR using docker save.
10196
artifact_path: './'
102-
97+
10398
# If enabled, this setting will display Inspector's vulnerability scan findings
10499
# as a GitHub actions step summary. See here for an example step summary:
105100
# https://github.com/aws-actions/vulnerability-scan-github-action-for-amazon-inspector/actions/runs/8800085041
106101
display_vulnerability_findings: "enabled"
107-
102+
108103
# Set vulnerability thresholds; if the number of vulnerabilities is
109104
# equal to or greater than any of the specified thresholds, this
110105
# action will set the 'vulnerability_threshold_exceeded'
@@ -114,27 +109,27 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
114109
medium_threshold: 1
115110
low_threshold: 1
116111
other_threshold: 1
117-
112+
118113
# Additional input arguments are available to control scan behavior.
119114
# See 'action.yml' for additional input/output options.
120-
121-
122-
# The following steps illustrate how to
115+
116+
117+
# The following steps illustrate how to
123118
# display scan results in the GitHub Actions job terminal.
124119
- name: Display CycloneDX SBOM (JSON)
125120
run: cat ${{ steps.inspector.outputs.artifact_sbom }}
126-
121+
127122
- name: Display Inspector vulnerability scan results (JSON)
128123
run: cat ${{ steps.inspector.outputs.inspector_scan_results }}
129-
124+
130125
- name: Display Inspector vulnerability scan results (CSV)
131126
run: cat ${{ steps.inspector.outputs.inspector_scan_results_csv }}
132-
127+
133128
- name: Display Inspector vulnerability scan results (Markdown)
134129
run: cat ${{ steps.inspector.outputs.inspector_scan_results_markdown }}
135-
136-
137-
# The following steps illustrate how to
130+
131+
132+
# The following steps illustrate how to
138133
# upload scan results as a GitHub actions job artifact
139134
- name: Upload Scan Results
140135
uses: actions/upload-artifact@v4
@@ -145,8 +140,8 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
145140
${{ steps.inspector.outputs.inspector_scan_results_csv }}
146141
${{ steps.inspector.outputs.artifact_sbom }}
147142
${{ steps.inspector.outputs.inspector_scan_results_markdown }}
148-
149-
143+
144+
150145
# This step illustrates how to add custom logic if
151146
# the vulnerability threshold is exceeded. This example
152147
# simply prints the 'vulnerability_threshold_exceeded' value
@@ -165,16 +160,9 @@ For additional examples, see [this repository's workflow definitions](.github/wo
165160
166161
### Configuring Vulnerability Scan Outputs
167162
168-
This action provides detailed Inspector scan findings in JSON, CSV, and markdown, as well as a CycloneDX software bill
169-
of
170-
materials in JSON.
171-
172-
By default, this action will only display the number of vulnerabilities detected in the GitHub Actions job terminal.
173-
Detailed vulnerability findings are not shown by design.
174-
175-
This is done so **you** can control how and where your vulnerability findings are presented and stored.
163+
By default, this action only displays the number of vulnerabilities detected in the GitHub Actions job terminal. Detailed findings are optional and configurable as JSON, CSV, or Markdown. In addition, an artifact inventory is available as a CycloneDX JSON file.
176164
177-
The example below shows how to present this action's outputs in various locations and formats.
165+
The below example shows how to enable action outputs in various locations and formats.
178166
179167
**Exercise caution to ensure you do not accidentally post vulnerability information to untrusted viewers.**
180168

0 commit comments

Comments
 (0)