Skip to content

Commit fb6d0db

Browse files
bluesentinelsecMichael Long
andauthored
clarify repository scanning (#34)
Co-authored-by: Michael Long <mlongii@amazon.com>
1 parent cd3f6a4 commit fb6d0db

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Using this action, you can automatically scan supported artifacts with Amazon In
99

1010
Amazon Inspector for GitHub Actions can be used to detect software vulnerabilities in the following artifacts within your GitHub Actions workflows:
1111

12-
1. Your repository contents
12+
1. Package dependencies
1313
2. Container images
1414
3. Compiled Go and Rust binaries
1515
4. Archives *(.zip, .tar, .tar.gz)*
@@ -44,9 +44,9 @@ The following examples demonstrate how to use this action:
4444
- See [here for example workflows](./.github/workflows/).
4545

4646

47-
### 1. Scan Repository
47+
### 1. Scan Package Dependencies
4848

49-
This example will scan your repository contents for vulnerable software packages.
49+
This example will scan your repository contents for vulnerable software packages, based on contents from files such as requirements.txt.
5050

5151
```yaml
5252
- name: Invoke Amazon Inspector Scan

0 commit comments

Comments
 (0)