@@ -140,11 +140,11 @@ jobs:
140
140
- name : Check out the repository
141
141
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
142
142
- name : Initialize CodeQL
143
- uses : github/codeql-action/init@1b549b9259bda1cb5ddde3b41741a82a2d15a841
143
+ uses : github/codeql-action/init@28deaeda66b76a05916b6923827895f2b14ab387
144
144
with :
145
145
languages : go
146
146
- name : Run CodeQL variant analysis
147
- uses : github/codeql-action/analyze@1b549b9259bda1cb5ddde3b41741a82a2d15a841
147
+ uses : github/codeql-action/analyze@28deaeda66b76a05916b6923827895f2b14ab387
148
148
- name : Show CodeQL scan SARIF report
149
149
if : always()
150
150
run : cat ../results/go.sarif
@@ -156,7 +156,7 @@ jobs:
156
156
- name : Check out the repository
157
157
uses : actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
158
158
- name : Run Anchore vulnerability scanner
159
- uses : anchore/scan-action@7c05671ae9be166aeb155bad2d7df9121823df32
159
+ uses : anchore/scan-action@2c901ab7378897c01b8efaa2d0c9bf519cc64b9e
160
160
id : scan
161
161
with :
162
162
path : " ."
@@ -167,7 +167,7 @@ jobs:
167
167
run : cat ${{ steps.scan.outputs.sarif }}
168
168
- name : Upload Anchore scan SARIF report
169
169
if : always()
170
- uses : github/codeql-action/upload-sarif@1b549b9259bda1cb5ddde3b41741a82a2d15a841
170
+ uses : github/codeql-action/upload-sarif@28deaeda66b76a05916b6923827895f2b14ab387
171
171
with :
172
172
sarif_file : ${{ steps.scan.outputs.sarif }}
173
173
0 commit comments