diff --git a/.github/workflows/main.yaml b/.github/workflows/main.yaml index 8c76fdd23..375efa246 100644 --- a/.github/workflows/main.yaml +++ b/.github/workflows/main.yaml @@ -21,7 +21,7 @@ jobs: - env steps: - name: Checkout 🛎️ - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4 - name: Yaml Lint uses: ibiqlik/action-yamllint@2576378a8e339169678f9939646ee3ee325e845c # v3 with: @@ -34,7 +34,7 @@ jobs: - env steps: - name: Checkout 🛎️ - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4 - name: Scan repo id: kube-lint-repo @@ -52,7 +52,7 @@ jobs: - env steps: - name: Checkout 🛎️ - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4 - name: Find Secrets 🔍 shell: bash run: | @@ -85,7 +85,7 @@ jobs: runs-on: ubuntu-22.04 steps: - name: Checkout code 🛎️ - uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4 + uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4 - name: Run Trivy vulnerability scanner in IaC mode 🔎 uses: aquasecurity/trivy-action@master