@@ -10,9 +10,6 @@ inputs:
10
10
description : Whether to add a comment to the PR with the Trivy scan results
11
11
required : false
12
12
default : ' true'
13
- slack-webhook-url :
14
- description : Slack webhook URL for notifications
15
- required : false
16
13
17
14
runs :
18
15
using : ' composite'
@@ -146,33 +143,3 @@ runs:
146
143
env :
147
144
TRIVY_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-db:2
148
145
TRIVY_JAVA_DB_REPOSITORY : public.ecr.aws/aquasecurity/trivy-java-db:1
149
-
150
- - name : Send Slack Notification for Vulnerabilities
151
- if : inputs.add-report-comment-to-pr == 'true' && inputs.slack-webhook-url != ''
152
- uses : 8398a7/action-slack@v3
153
- with :
154
- status : ${{ job.status }}
155
- author_name : Github-Actions
156
- fields : repo,workflow
157
- text : " 🚨 *Security Alert: High/Critical Vulnerabilities Detected* \n
158
- Repository: ${{ github.repository }} \n
159
- Branch: ${{ github.ref_name }} \n
160
- PR: ${{ github.event.pull_request.html_url }} \n
161
- , please review and address these vulnerabilities."
162
- env :
163
- SLACK_WEBHOOK_URL : ${{ inputs.slack-webhook-url }}
164
-
165
- - name : Send Slack Notification for Secrets
166
- if : inputs.add-report-comment-to-pr == 'true' && inputs.slack-webhook-url != ''
167
- uses : 8398a7/action-slack@v3
168
- with :
169
- status : ${{ job.status }}
170
- author_name : Github-Actions
171
- fields : repo,workflow
172
- text : " 🔒 *Security Alert: Secrets Detected* \n
173
- Repository: ${{ github.repository }} \n
174
- Branch: ${{ github.ref_name }} \n
175
- PR: ${{ github.event.pull_request.html_url }} \n
176
- , please review and remove any exposed secrets."
177
- env :
178
- SLACK_WEBHOOK_URL : ${{ inputs.slack-webhook-url }}
0 commit comments