This is an automated email from the ASF dual-hosted git repository.

hainenber pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/superset.git


The following commit(s) were added to refs/heads/master by this push:
     new 75d6a95ac39 chore(deps): bump aquasecurity/trivy-action from 0.33.1 to 
0.34.0 (#37958)
75d6a95ac39 is described below

commit 75d6a95ac39ee25c98f16bbbb79e4efd58912b27
Author: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
AuthorDate: Fri Feb 13 23:39:30 2026 +0700

    chore(deps): bump aquasecurity/trivy-action from 0.33.1 to 0.34.0 (#37958)
    
    Signed-off-by: dependabot[bot] <[email protected]>
    Co-authored-by: dependabot[bot] 
<49699333+dependabot[bot]@users.noreply.github.com>
---
 .github/workflows/docker.yml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/.github/workflows/docker.yml b/.github/workflows/docker.yml
index 9257b26fc50..a1b436e3fae 100644
--- a/.github/workflows/docker.yml
+++ b/.github/workflows/docker.yml
@@ -104,7 +104,7 @@ jobs:
       # Scan for vulnerabilities in built container image after pushes to 
mainline branch.
       - name: Run Trivy container image vulnerabity scan
         if: github.event_name == 'push' && github.ref == 'refs/heads/master' 
&& (steps.check.outputs.python || steps.check.outputs.frontend || 
steps.check.outputs.docker) && matrix.build_preset == 'lean'
-        uses: 
aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # v0.33.1
+        uses: 
aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0
         with:
           image-ref: ${{ env.IMAGE_TAG }}
           format: 'sarif'

Reply via email to