Skip to content

Releases: aws-actions/vulnerability-scan-github-action-for-amazon-inspector

v1.4.0

16 Sep 14:42
ce534f0
Compare
Choose a tag to compare

Summary

This PR updates all GitHub Actions workflows to use the latest v1.4.0 release while implementing performance improvements and security best practices.

Changes Made

⚡ Performance Optimization
• Updated Dockerfile to use public.ecr.aws/aws-cli/aws-cli:latest base image instead of building from amazonlinux
• Eliminates need to install Python3 and AWS CLI during build, reducing action installation time by 10-20 seconds

🔒 Security Hardening
• Added explicit permissions blocks to all workflows following principle of least privilege
• Granted only necessary permissions (contents: read, id-token: write, actions: write where needed)

📦 Version Updates
• Updated all workflow references from v1.3.0 to v1.4.0

Files Modified

• 14 workflow files updated with permissions and version bumps
• Dockerfile optimized for faster builds

Benefits

Faster CI/CD: Reduced action startup time by 10-20 seconds per workflow run
Enhanced Security: Explicit permission declarations prevent privilege escalation

🙏 Acknowledgments

Special thanks to @joshuagrisham for his contribution from #128.

v1.3.0

01 Jul 14:44
Compare
Choose a tag to compare

Added a new option, threshold_fixable_only. When set to true, only vulnerabilities with a fix count towards threshold exceeded vulnerability counts. Vulnerabilities without a fix do not count towards the threshold. This option is intended to support workflows that wish to invoke custom logic, such as job failure, only when fixable vulnerabilities are present.

Added a new option, show_only_fixable_vulns. When enabled, the action will only display vulnerabilities for which a fix is available in the GitHub Actions step summary. Vulnerabilities without a fix are still present in the raw Inspector scan JSON or CSV.

Added reference in project README to the Amazon Inspector SBOM Generator software license: AWS Intellectual Property License.

An example workflow demonstrating these new features is available here.

For more information, feel encouraged to peruse the source code changes: #123

v1.2.1

10 Apr 14:39
5dc8a4b
Compare
Choose a tag to compare

Improves consistency between Vulnerability Counts by Severity summary and detailed Vulnerability Findings tables when rendering the Inspector Scan step summary.

  • Resolves issue #111

v1.2.0

26 Nov 18:41
8c2d4d7
Compare
Choose a tag to compare

This release adds support for scanning multi-arch container images.

To use this feature, specify the OS and CPU platform matching the image you wish to scan by adding the platform argument to your workflows, as shown below:

      - name: Scan built image with Inspector
        uses: aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
        id: inspector
        with:
          artifact_type: 'container'
          artifact_path: 'alpine:latest'
          ...
          platform: "linux/arm64/v8"
          sbomgen_version: "latest"

If platform is unspecified, this action will default to the OS/CPU platform that matches the GitHub Actions runner.

⚠️ This workflow requires inspector-sbomgen versions greater than or equal to 1.5.2.

v1.1.5

26 Nov 18:58
8c2d4d7
Compare
Choose a tag to compare

Improved handling of Inspector reports (CSV, JSON, Markdown) when no vulnerabilities were found.

v1.1.4

06 Sep 15:36
d771038
Compare
Choose a tag to compare
  • This release fixes an issue that caused the example workflow to fail when no vulnerabilities were detected (see issue 85 and PR #86).

  • Minor improvements to the Dockerfile markdown report (#92, #93, #94)

v1.1.3

30 Jul 14:21
a3574ba
Compare
Choose a tag to compare

This patch release improves parsing and rendering of the Inspector vulnerability summary report (#72, #75, #77, #78):

  • Added new column Source which denotes the vendor that provided the vulnerability severity, such as NVD, MITRE, or Amazon Inspector.
  • Resolved issue that was causing vulnerability severity to be empty when the severity was provided by a source other than NVD.

v1.1.2

27 Jun 20:03
016a421
Compare
Choose a tag to compare

Resolves an issue that prevented the action from executing on aarch64 systems. #62

v1.1.1

17 Jun 15:31
Compare
Choose a tag to compare

The vulnerability step summary is now displayed when zero vulnerabilities are present. #60

v1.1.0

04 Jun 17:35
ecf6e39
Compare
Choose a tag to compare

This release adds support for a new vulnerability finding type: Dockerfile security configuration issues.

This action will scan stand alone Dockerfiles in your project, archive, or container image for vulnerabilities.

Additionally, this action will scan an image's build history for security issues.