This is an automated email from the ASF dual-hosted git repository.
hainenber pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/superset.git
The following commit(s) were added to refs/heads/master by this push:
new 5bee32ea93 chore(deps): bump aquasecurity/trivy-action from 0.34.0 to
0.34.1 (#38138)
5bee32ea93 is described below
commit 5bee32ea93dd49b6079ea8edeef15479ebb6d263
Author: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
AuthorDate: Sat Feb 21 11:45:40 2026 +0700
chore(deps): bump aquasecurity/trivy-action from 0.34.0 to 0.34.1 (#38138)
Signed-off-by: dependabot[bot] <[email protected]>
Co-authored-by: dependabot[bot]
<49699333+dependabot[bot]@users.noreply.github.com>
---
.github/workflows/docker.yml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/.github/workflows/docker.yml b/.github/workflows/docker.yml
index a1b436e3fa..6b9c16b82f 100644
--- a/.github/workflows/docker.yml
+++ b/.github/workflows/docker.yml
@@ -104,7 +104,7 @@ jobs:
# Scan for vulnerabilities in built container image after pushes to
mainline branch.
- name: Run Trivy container image vulnerabity scan
if: github.event_name == 'push' && github.ref == 'refs/heads/master'
&& (steps.check.outputs.python || steps.check.outputs.frontend ||
steps.check.outputs.docker) && matrix.build_preset == 'lean'
- uses:
aquasecurity/trivy-action@c1824fd6edce30d7ab345a9989de00bbd46ef284 # v0.34.0
+ uses:
aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1
with:
image-ref: ${{ env.IMAGE_TAG }}
format: 'sarif'