From 1edb9333272b13a3222088578a62519ae44da18b Mon Sep 17 00:00:00 2001 From: Andreas Gebhardt Date: Wed, 18 Nov 2020 14:13:00 +0100 Subject: [PATCH 1/2] use latest version for GitHub Action(s) > Run actions/setup-node@83c9f7a7df54d6b57455f7c57ac414f2ae5fb8de > Error: Unable to process command '::add-path::/opt/hostedtoolcache/node/12.19.0/x64/bin' successfully. > Error: The `add-path` command is disabled. Please upgrade to using Environment Files or opt into unsecure command execution by setting the `ACTIONS_ALLOW_UNSECURE_COMMANDS` environment variable to `true`. For more information see: https://github.blog/changelog/2020-10-01-github-actions-deprecating-set-env-and-add-path-commands/ --- .github/workflows/pull_request.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/pull_request.yml b/.github/workflows/pull_request.yml index d486eca..1572d9b 100644 --- a/.github/workflows/pull_request.yml +++ b/.github/workflows/pull_request.yml @@ -9,12 +9,12 @@ jobs: test: runs-on: ubuntu-latest steps: - - uses: actions/checkout@01aecccf739ca6ff86c0539fbc67a7a5007bbc81 - - uses: actions/setup-node@83c9f7a7df54d6b57455f7c57ac414f2ae5fb8de + - uses: actions/checkout@5a4ac9002d0be2fb38bd78e4b4dbde5606d7042f + - uses: actions/setup-node@56899e050abffc08c2b3b61f3ec6a79a9dc3223d with: node-version: 12 - - uses: actions/cache@70655ec8323daeeaa7ef06d7c56e1b9191396cbe + - uses: actions/cache@0781355a23dac32fd3bac414512f4b903437991a id: cache with: path: ~/.npm From e572cdddef9f43c5ee577f856bcc3c3d46c4cadf Mon Sep 17 00:00:00 2001 From: Andreas Gebhardt Date: Wed, 18 Nov 2020 14:21:22 +0100 Subject: [PATCH 2/2] =?UTF-8?q?fix=20redirect=20of=20=C2=BBSysdig=20Secure?= =?UTF-8?q?=C2=AB=20link?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index fdca7a2..b3e9769 100644 --- a/README.md +++ b/README.md @@ -301,7 +301,7 @@ _Source:_ [What is Docker](https://www.docker.com/why-docker) - [Phonito Security](https://phonito.io/?b=b) :heavy_dollar_sign: - a Docker vulnerability scanner with constant Kubernetes monitoring and pipeline integration. - [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud) :heavy_dollar_sign: - (previously Twistlock Security Suite) detects vulnerabilities, hardens container images, and enforces security policies across the lifecycle of applications. - [Sysdig Falco](https://github.com/falcosecurity/falco) - Sysdig Falco is an open source container security monitor. It can monitor application, container, host, and network activity and alert on unauthorized activity. -- [Sysdig Secure](https://sysdig.com/products/kubernetes-security/runtime-security/) :heavy_dollar_sign: - Sysdig Secure addresses run-time security through behavioral monitoring and defense, and provides deep forensics based on open source Sysdig for incident response. +- [Sysdig Secure](https://sysdig.com/products/secure/runtime-security/) :heavy_dollar_sign: - Sysdig Secure addresses run-time security through behavioral monitoring and defense, and provides deep forensics based on open source Sysdig for incident response. - [Trend Micro DeepSecurity](https://www.trendmicro.com/en_us/business/products/hybrid-cloud/deep-security.html) :heavy_dollar_sign: - Trend Micro DeepSecurity offers runtime protection for container workloads and hosts as well as preruntime scanning of images to identify vulnerabilities, malware and content such as hardcoded secrets. - [Trivy](https://github.com/aquasecurity/trivy) - Aqua Security's open source simple and comprehensive vulnerability scanner for containers (suitable for CI).