Skip to content

ci: replace Trivy with Docker Scout for image scanning#614

Merged
pkaeding merged 10 commits intov8from
security/replace-trivy-with-docker-scout
Apr 2, 2026
Merged

ci: replace Trivy with Docker Scout for image scanning#614
pkaeding merged 10 commits intov8from
security/replace-trivy-with-docker-scout

Conversation

@pkaeding
Copy link
Copy Markdown
Contributor

Summary

  • Replace aquasecurity/trivy-action with docker/scout-action (v1, pinned to SHA) across all 3 security scan workflows (CI, daily alpine, daily distroless)
  • Motivated by recent security incidents with Trivy as a vendor; Docker Scout is from Docker Inc., an existing vendor relationship
  • Added Docker Hub authentication via release-secrets (required for Scout API access)
  • Also pinned pre-existing docker/setup-qemu-action and docker/setup-buildx-action to commit SHAs in CI

Test plan

  • Verify the CI security-scan job runs successfully on this PR
  • Confirm Docker Scout correctly identifies CVEs in the built images
  • Manually trigger daily scan workflows after merge to verify they work with published images
  • Verify release-secrets AWS role assumption works in the security-scan job context

🤖 Generated with Claude Code

Replace aquasecurity/trivy-action with docker/scout-action across all
security scan workflows due to security concerns with Trivy as a vendor.
Docker Scout is from Docker Inc., an existing vendor relationship.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@pkaeding pkaeding requested a review from a team as a code owner March 30, 2026 21:30
@pkaeding pkaeding requested a review from a team March 30, 2026 21:31
@pkaeding
Copy link
Copy Markdown
Contributor Author

This PR can replace #610

When explicit permissions are set at the job level, all other
permissions default to none. The checkout step requires contents: read.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
pkaeding and others added 4 commits March 31, 2026 12:25
Co-authored-by: Matthew M. Keeler <mkeeler@launchdarkly.com>
Co-authored-by: Matthew M. Keeler <keelerm84@gmail.com>
…ivy-with-docker-scout' into security/replace-trivy-with-docker-scout
Copy link
Copy Markdown

@cursor cursor bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Cursor Bugbot has reviewed your changes and found 1 potential issue.

There are 2 total unresolved issues (including 1 from previous review).

Fix All in Cursor

Bugbot Autofix is OFF. To automatically fix reported issues with cloud agents, have a team admin enable autofix in the Cursor dashboard.

pkaeding and others added 3 commits March 31, 2026 21:47
Removes the get-docker-credentials job and AWS OIDC dependency from
scan workflows. Scout now authenticates with a read-only Docker Hub
token stored as a repo secret, eliminating exposure of AWS credentials
and OIDC tokens to third-party actions.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@pkaeding pkaeding merged commit 61a1eeb into v8 Apr 2, 2026
13 of 15 checks passed
@pkaeding pkaeding deleted the security/replace-trivy-with-docker-scout branch April 2, 2026 14:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants