This is an automated email from the ASF dual-hosted git repository.

rusackas pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/superset.git


The following commit(s) were added to refs/heads/master by this push:
     new 1bfd41df0c chore(deps): bump aquasecurity/trivy-action from 0.34.1 to 
0.34.2 (#38352)
1bfd41df0c is described below

commit 1bfd41df0ca2181cf72dfec6e4877a00eb44c36a
Author: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
AuthorDate: Wed Mar 4 11:30:15 2026 -0800

    chore(deps): bump aquasecurity/trivy-action from 0.34.1 to 0.34.2 (#38352)
    
    Signed-off-by: dependabot[bot] <[email protected]>
    Co-authored-by: dependabot[bot] 
<49699333+dependabot[bot]@users.noreply.github.com>
---
 .github/workflows/docker.yml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/.github/workflows/docker.yml b/.github/workflows/docker.yml
index 6b9c16b82f..e17da498ee 100644
--- a/.github/workflows/docker.yml
+++ b/.github/workflows/docker.yml
@@ -104,7 +104,7 @@ jobs:
       # Scan for vulnerabilities in built container image after pushes to 
mainline branch.
       - name: Run Trivy container image vulnerabity scan
         if: github.event_name == 'push' && github.ref == 'refs/heads/master' 
&& (steps.check.outputs.python || steps.check.outputs.frontend || 
steps.check.outputs.docker) && matrix.build_preset == 'lean'
-        uses: 
aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1
+        uses: 
aquasecurity/trivy-action@97e0b3872f55f89b95b2f65b3dbab56962816478 # v0.34.2
         with:
           image-ref: ${{ env.IMAGE_TAG }}
           format: 'sarif'

Reply via email to