4949#### Global parameters  
5050
5151``` yaml 
52-    global_severity_cutoff :
53-      description : ' grype/trivy vulnerability severity cutoff' 
54-      options :
55-     - ' negligible' 
56-     - ' low' 
57-     - ' medium' 
58-     - ' high' 
59-     - ' critical' 
60-    global_enforce_build_failure :
61-      description : ' This will enforce the build failure regardless of `fail_build` external input parameter value for a specified `severity_cutoff`' 
52+ global_severity_cutoff :
53+   description : " grype/trivy vulnerability severity cutoff" 
54+   options :
55+     - " negligible" 
56+     - " low" 
57+     - " medium" 
58+     - " high" 
59+     - " critical" 
60+ global_enforce_build_failure :
61+   description : " This will enforce the build failure regardless of `fail_build` external input parameter value for a specified `severity_cutoff`" 
6262` ` ` 
6363
6464### Required Workflow Permissions 
@@ -73,48 +73,54 @@ permissions:
7373- Inputs **image / dir / file** are mutually exclusive. Any one input is mandatory 
7474
7575` ` ` yaml 
76-   asset_prefix :
77-     description : ' prefix for generated scan artifacts' 
78-     required : false 
79-     default : ' ' 
80-   dir : 
81-     description : ' Specify a directory to be scanned. This is mutually exclusive to file and image' 
82-     required : ' false' 
83-     default : ' ' 
84-   file :
85-     description : ' Specify a file to be scanned. This is mutually exclusive to dir and image' 
86-     required : ' false' 
87-     default : ' ' 
88-   config :
89-     description : ' file path to syft custom configuration' 
90-     required : false 
91-   fail_build :
92-     description : ' fail the build if the vulnerability is above the severity cutoff' 
93-     required : ' false' 
94-     default : ' false' 
95-     type : choice 
96-     options :
97-     - ' true' 
98-     - ' false' 
99-   github-token :
100-     description : " Authorized secret GitHub Personal Access Token. Defaults to github.token" 
101-     required : false 
102-     default : ${{ github.token }} 
103-   upload-sbom-release-assets :
104-     description : ' specify to only upload sboms to GH release assets.' 
105-     required : false 
106-     default : false 
107-     type : choice 
108-     options :
109-     - ' true' 
110-     - ' false' 
76+ asset_prefix :
77+   description : " prefix for generated scan artifacts" 
78+   required : false 
79+   default : " " 
80+ dir :
81+   description : " Specify a directory to be scanned. This is mutually exclusive to file and image" 
82+   required : " false" 
83+   default : " " 
84+ file :
85+   description : " Specify a file to be scanned. This is mutually exclusive to dir and image" 
86+   required : " false" 
87+   default : " " 
88+ config :
89+   description : " file path to syft custom configuration" 
90+   required : false 
91+ fail_build :
92+   description : " fail the build if the vulnerability is above the severity cutoff" 
93+   required : " false" 
94+   default : " false" 
95+   type : choice 
96+   options :
97+     - " true" 
98+     - " false" 
99+ github-token :
100+   description : " Authorized secret GitHub Personal Access Token. Defaults to github.token" 
101+   required : false 
102+   default : ${{ github.token }} 
103+ upload-sbom-release-assets :
104+   description : " specify to only upload sboms to GH release assets." 
105+   required : false 
106+   default : false 
107+   type : choice 
108+   options :
109+     - " true" 
110+     - " false" 
111+ grype_db_cache :
112+   description : " GitHub repository containing Grype DB cache (format: owner/repo@ref). Database should be named `db_v*.tar.zst` on the default branch." 
113+   required : false 
114+ grype_db_cache_token :
115+   description : " Token for accessing `grype_db_cache`." 
116+   required : false 
111117` ` ` 
112118
113119#### Output specification 
114120
115- - Generates sbom reports in **spdx.json** and **cyclonedx.xml** formats using *syft*  on the inputs **image / dir / file** 
121+ - Generates sbom reports in **spdx.json** and **cyclonedx.xml** formats using _syft_  on the inputs **image / dir / file** 
116122
117- - Generates cve vulnerability analysis report based on the spdx sbom file using *grype*  
123+ - Generates cve vulnerability analysis report based on the spdx sbom file using _grype_  
118124
119125- Uploads all the generated security assets as workflow artifacts and retained based on repo / org settings 
120126
@@ -123,14 +129,14 @@ permissions:
123129# ### Output parameters
124130
125131` ` ` yaml
126-      grype-sarif-report:
127-        description: ' vulnerability SARIF report'  
128-      grype-json-report:
129-        description: ' vulnerability JSON report'    
130-      sbom-spdx-report:
131-        description: ' SBOM spdx report'  
132-      sbom-cyclonedx-report:
133-        description: ' SBOM cyclonedx report'  
132+ grype-sarif-report: 
133+   description: " vulnerability SARIF report"  
134+ grype-json-report: 
135+   description: " vulnerability JSON report"  
136+ sbom-spdx-report: 
137+   description: " SBOM spdx report"  
138+ sbom-cyclonedx-report: 
139+   description: " SBOM cyclonedx report"  
134140` ` ` 
135141
136142# ## Migration Strategy
@@ -153,7 +159,7 @@ We expect application teams to use the advanced configuration of ignore rules wi
153159
154160To bypass blocking builds during emergency releases/scenarios where CVE fix needs a lot of refactoring during a hotfix :
155161
156- # ### Syft  
162+ # ### Syft
157163
1581641. Generate a Syft [Override](https://github.com/anchore/syft?tab=readme-ov-file#configuration) configuration file 
1591652. [Select catalogers](https://github.com/anchore/syft?tab=readme-ov-file#package-cataloger-selection) 
@@ -176,12 +182,12 @@ name: SCA Repository Scan
176182on: 
177183  pull_request: 
178184    branches: 
179-     - main 
185+        - main 
180186  push: 
181187    branches: 
182-     - main 
188+        - main 
183189    tags: 
184-     - '*'  
190+       - "*"  
185191
186192jobs: 
187193  sca: 
@@ -193,13 +199,13 @@ jobs:
193199      pull-requests: write 
194200    name: Repository Scan 
195201    steps: 
196-          - uses: actions/checkout@v4 
197-          - name: Scan Repository 
198-            id: sca_repo 
199-            uses: Kong/public-shared-actions/security-actions/sca@main 
200-            with: 
201-              asset_prefix: <repo-name-slug> #output files prefix 
202-              dir: '.'  # Path to directory where the repository is checked out 
203-              config: .syft.yaml # Custom config for overrides in repository root 
204-              fail_build: ' true'  # Fail job if critical vulnerabilities are detected 
205- ` ` ` 
202+       - uses: actions/checkout@v4 
203+       - name: Scan Repository 
204+         id: sca_repo 
205+         uses: Kong/public-shared-actions/security-actions/sca@main 
206+         with: 
207+           asset_prefix: <repo-name-slug> #output files prefix 
208+           dir: "."  # Path to directory where the repository is checked out 
209+           config: .syft.yaml # Custom config for overrides in repository root 
210+           fail_build: " true"  # Fail job if critical vulnerabilities are detected 
211+ ` ` ` 
0 commit comments