Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Dec 2, 2025

This PR contains the following updates:

Package Type Update Change
actions/checkout action patch v6.0.0 -> v6.0.1

Release Notes

actions/checkout (actions/checkout)

v6.0.1

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-project-automation github-project-automation bot moved this to 🏃🏻‍♂️ In Progress in 🌊 Project Board Dec 2, 2025
@github-project-automation github-project-automation bot moved this from 🏃🏻‍♂️ In Progress to 🚀 In Finalization in 🌊 Project Board Dec 2, 2025
@botantler botantler bot enabled auto-merge (squash) December 2, 2025 20:58
@github-actions
Copy link

github-actions bot commented Dec 2, 2025

MegaLinter analysis: Error

❌ REPOSITORY / grype - 1 error
[0000]  WARN no explicit name and version provided for directory source, deriving artifact ID from the given path (which is not ideal)
NAME                      INSTALLED  FIXED IN  TYPE       VULNERABILITY        SEVERITY  EPSS          RISK   
github.com/anchore/grype  v0.101.1   0.104.1   go-module  GHSA-6gxw-85q2-q646  High      < 0.1% (3rd)  < 0.1
[0028] ERROR discovered vulnerabilities at or above the severity threshold
❌ REPOSITORY / trivy - 1 error
2025-12-02T21:03:59Z	INFO	[vulndb] Need to update DB
2025-12-02T21:03:59Z	INFO	[vulndb] Downloading vulnerability DB...
2025-12-02T21:03:59Z	INFO	[vulndb] Downloading artifact...	repo="mirror.gcr.io/aquasec/trivy-db:2"
43.83 MiB / 76.59 MiB [---------------------------------->__________________________] 57.23% ? p/s ?76.59 MiB / 76.59 MiB [----------------------------------------------------------->] 100.00% ? p/s ?76.59 MiB / 76.59 MiB [----------------------------------------------------------->] 100.00% ? p/s ?76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 54.58 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 54.58 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 54.58 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 51.06 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 51.06 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 51.06 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 47.76 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 47.76 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 47.76 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [---------------------------------------------->] 100.00% 44.68 MiB p/s ETA 0s76.59 MiB / 76.59 MiB [-------------------------------------------------] 100.00% 29.50 MiB p/s 2.8s2025-12-02T21:04:03Z	INFO	[vulndb] Artifact successfully downloaded	repo="mirror.gcr.io/aquasec/trivy-db:2"
2025-12-02T21:04:03Z	INFO	[vuln] Vulnerability scanning is enabled
2025-12-02T21:04:03Z	INFO	[misconfig] Misconfiguration scanning is enabled
2025-12-02T21:04:03Z	INFO	[misconfig] Need to update the checks bundle
2025-12-02T21:04:03Z	INFO	[misconfig] Downloading the checks bundle...
165.46 KiB / 165.46 KiB [---------------------------------------------------------] 100.00% ? p/s 0s2025-12-02T21:04:06Z	INFO	Number of language-specific files	num=2
2025-12-02T21:04:06Z	INFO	[gomod] Detecting vulnerabilities...
2025-12-02T21:04:06Z	INFO	Detected config files	num=3

Report Summary

┌──────────────────────────────────────────────────────┬────────────┬─────────────────┬───────────────────┐
│                        Target                        │    Type    │ Vulnerabilities │ Misconfigurations │
├──────────────────────────────────────────────────────┼────────────┼─────────────────┼───────────────────┤
│ .github/scripts/generate-schema/go.mod               │   gomod    │        0        │         -         │
├──────────────────────────────────────────────────────┼────────────┼─────────────────┼───────────────────┤
│ go.mod                                               │   gomod    │        1        │         -         │
├──────────────────────────────────────────────────────┼────────────┼─────────────────┼───────────────────┤
│ Dockerfile                                           │ dockerfile │        -        │         0         │
├──────────────────────────────────────────────────────┼────────────┼─────────────────┼───────────────────┤
│ pkg/svc/installer/applyset/assets/apply-set-cr.yaml  │ kubernetes │        -        │         0         │
├──────────────────────────────────────────────────────┼────────────┼─────────────────┼───────────────────┤
│ pkg/svc/installer/applyset/assets/apply-set-crd.yaml │ kubernetes │        -        │         0         │
└──────────────────────────────────────────────────────┴────────────┴─────────────────┴───────────────────┘
Legend:
- '-': Not scanned
- '0': Clean (no security findings detected)


For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your project that you believe are not actually exploitable, consider issuing a VEX (Vulnerability Exploitability eXchange) statement.
VEX allows you to communicate the actual status of vulnerabilities in your project, improving security transparency and reducing false positives for your users.
Learn more and start using VEX: https://trivy.dev/v0.67/docs/supply-chain/vex/repo#publishing-vex-documents

To disable this notice, set the TRIVY_DISABLE_VEX_NOTICE environment variable.


go.mod (gomod)
==============
Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 1, CRITICAL: 0)

┌──────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬───────────────┬─────────────────────────────────────────────────────────────┐
│         Library          │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version │                            Title                            │
├──────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼───────────────┼─────────────────────────────────────────────────────────────┤
│ github.com/anchore/grype │ CVE-2025-65965 │ HIGH     │ fixed  │ v0.101.1          │ 0.104.1       │ Grype has a credential disclosure vulnerability in its JSON │
│                          │                │          │        │                   │               │ output                                                      │
│                          │                │          │        │                   │               │ https://avd.aquasec.com/nvd/cve-2025-65965                  │
└──────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴───────────────┴─────────────────────────────────────────────────────────────┘

📣 Notices:
  - Version 0.67.2 of Trivy is now available, current version is 0.67.0

To suppress version checks, run Trivy scans with the --skip-version-check flag

✅ Linters with no issues

actionlint, bash-exec, git_diff, hadolint, jscpd, jsonlint, lychee, markdown-table-formatter, markdownlint, prettier, prettier, shellcheck, shfmt, syft, trivy-sbom, trufflehog, v8r, v8r, yamllint

See detailed reports in MegaLinter artifacts

MegaLinter is graciously provided by OX Security

@codecov
Copy link

codecov bot commented Dec 2, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.

📢 Thoughts on this report? Let us know!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Status: 🚀 In Finalization

Development

Successfully merging this pull request may close these issues.

1 participant