Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve CVE scanning on the PRs to the k3s repo #10759

Closed
caroline-suse-rancher opened this issue Aug 27, 2024 · 2 comments
Closed

Improve CVE scanning on the PRs to the k3s repo #10759

caroline-suse-rancher opened this issue Aug 27, 2024 · 2 comments

Comments

@caroline-suse-rancher
Copy link
Contributor

In an effort to improve our rate of dependency bumps and CVE fixes, we would like more visibility into our scan results on each PR to the k3s project. This will likely involve a new GHA or something to that effect to expose the results of our CVE scans (right now we use Trivy) for each PR. That way we can evaluate what needs to be done on a release to release basis to mitigate CVEs.

@harsimranmaan
Copy link
Contributor

Would be nice to generate SBOMs and attestations for each release too

@dereknola
Copy link
Member

After far, far to many PRs, due to this workflow running on master (thus new code cannot be live tested until it is actually merged), this feature is finally complete. Any registered k3s-io org member (that is PUBLIC) can call /trivy as a comment and the bot will respond and generate a report.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done Issue
Development

No branches or pull requests

3 participants