@@ -231,20 +231,22 @@ Include these in your workflow's `jobs.<job_id>.permissions` section.
231231- uses: SocketDev/socket-basics@v2.0.2
232232 with:
233233 github_token: ${{ secrets.GITHUB_TOKEN }}
234- # Trivy-backed container scanning is temporarily not available in the
235- # pre-built GitHub Action image. Use a native install if you need it today.
236- # See docs/local-installation.md.
234+ # The supported pre-built GitHub Action path currently ships without
235+ # Trivy while we evaluate the safest way to bundle it with Basics again.
236+ # Use a native install if you need container scanning today.
237+ # See docs/local-installation.md#trivy-container-scanning.
237238` ` `
238239
239240> [!NOTE]
240- > Container and Dockerfile scanning remain part of Socket Basics, but the current
241- > GitHub Action and pre-built image paths have Trivy-backed support temporarily
242- > disabled while we complete additional security review of the underlying scanner
243- > dependency path. If container or Dockerfile scanning is a near-term
244- > requirement, the [native installation path](local-installation.md) remains
245- > available as a temporary workaround while the pre-built path is under
246- > additional review. Review the upstream install path and artifacts carefully
247- > before adopting it in production CI.
241+ > The supported pre-built GitHub Action and Docker image paths currently ship
242+ > _without_ Trivy while we evaluate the safest way to bundle it with Basics
243+ > again.
244+ > If you need container or Dockerfile scanning today, use the
245+ > [native installation path](local-installation.md). See
246+ > [Trivy (Container Scanning)](local-installation.md#trivy-container-scanning)
247+ > for the current version guidance and install options, and review the upstream
248+ > install path and artifacts carefully before adopting that path in production
249+ > CI.
248250
249251**Socket Tier 1 Reachability:**
250252` ` ` yaml
@@ -483,35 +485,16 @@ jobs:
483485
484486# ## Container Security Pipeline
485487
486- > [!NOTE]
487- > Container and Dockerfile scanning remain part of Socket Basics, but the current
488- > pre-built GitHub Action path has Trivy-backed support temporarily disabled while
489- > we complete additional security review of the underlying scanner dependency path.
490- > If container or Dockerfile scanning is a near-term requirement, the
491- > [native installation path](local-installation.md) remains available as a
492- > temporary workaround while the pre-built path is under additional review.
493- > Review the upstream install path and artifacts carefully before adopting it in
494- > production CI.
495-
496- > [!WARNING]
497- > This fallback path relies on upstream Trivy installation material outside the
498- > pinned pre-built distribution model. Review the upstream install path and
499- > artifacts carefully before using it in production CI.
500-
501488> [!IMPORTANT]
502- > Customer guidance while Trivy is disabled in the Socket Basics GitHub Action:
503- > if you must keep using Trivy independently in the same workflow, Socket's
504- > interim recommendation is to pin the Trivy binary to `v0.69.3`.
505- > Aqua's final incident report lists `v0.69.2` to `v0.69.3` as the
506- > known-safe binary range; the corresponding Docker image tags are `0.69.2` to
507- > `0.69.3` without the `v` prefix. We standardize on `v0.69.3` / Docker tag
508- > `0.69.3` in our examples.
489+ > The supported pre-built GitHub Action path currently ships _without_ Trivy
490+ > while we evaluate the safest way to bundle it with Basics again.
491+ > If you need Trivy in the meantime, install and run it independently in the
492+ > workflow, pin to `v0.69.3` or Docker tag `0.69.3`, and review the upstream
493+ > install path and artifacts carefully.
509494> Do not use `v0.69.4`, and audit any Docker Hub use of `0.69.5` and `0.69.6`.
510- > If you use Aqua's own actions directly outside Socket Basics, use
511- > `aquasecurity/trivy-action@v0.35.0` and `aquasecurity/setup-trivy@v0.2.6`, and
512- > pin them to full commit SHAs.
513- > Reference:
514- > https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/
495+ > See [Local Installation](local-installation.md#trivy-container-scanning) for
496+ > the detailed version guidance, corresponding Aqua action versions, and install
497+ > options.
515498
516499` ` ` yaml
517500name: Container Security
@@ -549,11 +532,6 @@ jobs:
549532 trivy config --exit-code 1 --severity HIGH,CRITICAL Dockerfile
550533` ` `
551534
552- If you replace the manual install step with Aqua-maintained actions in your own
553- workflow outside Socket Basics, Aqua's published safe versions are
554- ` aquasecurity/trivy-action@v0.35.0` and `aquasecurity/setup-trivy@v0.2.6`.
555- Pin those to full SHAs rather than mutable tags.
556-
557535# ## Dockerfile Auto-Discovery
558536
559537For repositories with multiple Dockerfiles across different directories, you can automatically discover them instead of manually listing each path.
@@ -609,8 +587,9 @@ jobs:
609587 with:
610588 github_token: ${{ secrets.GITHUB_TOKEN }}
611589 # Dockerfile discovery remains useful context for future container
612- # scanning support, but the current pre-built action image does not
613- # execute Trivy-backed scans.
590+ # scanning support, but the current pre-built action path currently
591+ # ships _without_ Trivy while we evaluate the safest way to bundle it
592+ # with Basics again.
614593 verbose: 'true'
615594` ` `
616595
@@ -719,10 +698,12 @@ See [`action.yml`](../action.yml) for the complete list of inputs.
719698
720699> [!NOTE]
721700> These inputs remain part of the action interface, but the current pre-built
722- > GitHub Action path has Trivy-backed support temporarily disabled while we
723- > complete additional security review of the underlying scanner dependency path.
724- > Use the [native installation path](local-installation.md) if container scanning
725- > is a near-term requirement.
701+ > GitHub Action path currently ships _without_ Trivy while we evaluate the
702+ > safest way to bundle it with Basics again.
703+ > Use the [native installation path](local-installation.md) if container
704+ > scanning is a near-term requirement. See
705+ > [Trivy (Container Scanning)](local-installation.md#trivy-container-scanning)
706+ > for the current version guidance and install options.
726707
727708**Notifications (Enterprise Required):**
728709- ` slack_webhook_url` — Slack webhook
@@ -779,10 +760,12 @@ permissions:
779760
780761**Solutions:**
781762> [!NOTE]
782- > The current pre-built GitHub Action path has Trivy-backed support temporarily
783- > disabled while the underlying scanner dependency path remains under additional
784- > security review. If container scanning is a near-term requirement, switch to a
785- > native Trivy install in the workflow.
763+ > The current pre-built GitHub Action path ships _without_ Trivy while we
764+ > evaluate the safest way to bundle it with Basics again. If container scanning
765+ > is a near-term requirement, switch to a native Trivy install in the workflow.
766+ > See
767+ > [Trivy (Container Scanning)](local-installation.md#trivy-container-scanning)
768+ > for the current version guidance and install options.
786769
7877701. For private images, add authentication :
788771` ` ` yaml
0 commit comments