Skip to content

Conversation

dereknola
Copy link
Owner

Proposed Changes

-Dumb PR to run trivy scan against

Types of Changes

Verification

Testing

Linked Issues

User-Facing Change


Further Comments

@dereknola dereknola added scan-with-trivy Triggers a Trivy Scan on PR and removed scan-with-trivy Triggers a Trivy Scan on PR labels Jul 7, 2025
@dereknola dereknola added scan-with-trivy Triggers a Trivy Scan on PR and removed scan-with-trivy Triggers a Trivy Scan on PR labels Jul 7, 2025
Signed-off-by: Derek Nola <derek.nola@suse.com>
@dereknola dereknola added scan-with-trivy Triggers a Trivy Scan on PR and removed scan-with-trivy Triggers a Trivy Scan on PR labels Jul 7, 2025
@dereknola dereknola added scan-with-trivy Triggers a Trivy Scan on PR and removed scan-with-trivy Triggers a Trivy Scan on PR labels Jul 7, 2025
Signed-off-by: Derek Nola <derek.nola@suse.com>
@github-actions github-actions bot removed the scan-with-trivy Triggers a Trivy Scan on PR label Jul 7, 2025
Copy link

github-actions bot commented Jul 7, 2025


Report Summary

┌─────────────────────────────┬──────────┬─────────────────┬─────────┐
│           Target            │   Type   │ Vulnerabilities │ Secrets │
├─────────────────────────────┼──────────┼─────────────────┼─────────┤
│ bin/cni                     │ gobinary │        0        │    -    │
├─────────────────────────────┼──────────┼─────────────────┼─────────┤
│ bin/containerd-shim-runc-v2 │ gobinary │        0        │    -    │
├─────────────────────────────┼──────────┼─────────────────┼─────────┤
│ bin/k3s                     │ gobinary │        0        │    -    │
├─────────────────────────────┼──────────┼─────────────────┼─────────┤
│ bin/runc                    │ gobinary │        0        │    -    │
└─────────────────────────────┴──────────┴─────────────────┴─────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/v0.63/docs/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


bin/k3s (gobinary)
==================
Total: 0 (HIGH: 0, CRITICAL: 0)


Suppressed Vulnerabilities (Total: 1)
=====================================
┌─────────────────────────────┬────────────────┬──────────┬──────────────┬─────────────────────────────┬──────────────────────┐
│           Library           │ Vulnerability  │ Severity │    Status    │          Statement          │        Source        │
├─────────────────────────────┼────────────────┼──────────┼──────────────┼─────────────────────────────┼──────────────────────┤
│ github.com/pion/interceptor │ CVE-2025-49140 │ HIGH     │ not_affected │ vulnerable_code_not_present │ rancher.openvex.json │
└─────────────────────────────┴────────────────┴──────────┴──────────────┴─────────────────────────────┴──────────────────────┘

Signed-off-by: Derek Nola <derek.nola@suse.com>
@dereknola dereknola added the scan-with-trivy Triggers a Trivy Scan on PR label Jul 7, 2025
Signed-off-by: Derek Nola <derek.nola@suse.com>
@dereknola dereknola removed the scan-with-trivy Triggers a Trivy Scan on PR label Jul 7, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
scan-with-trivy Triggers a Trivy Scan on PR
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant