Skip to main content
Glama
trivy-scan.yml1.06 kB
name: Trivy Security Scan on: schedule: # Run every Sunday at 00:00 UTC - cron: '0 0 * * 0' workflow_dispatch: permissions: contents: read security-events: write jobs: trivy-scan: name: Trivy Vulnerability Scan runs-on: ubuntu-latest steps: - name: Run Trivy Docker image scan (Debian only) uses: aquasecurity/trivy-action@master with: scan-type: image image-ref: ghcr.io/activepieces/activepieces:latest format: 'sarif' output: 'trivy-report.sarif' severity: 'CRITICAL,HIGH' ignore-unfixed: true vuln-type: 'os' skip-dirs: '/usr/src/app/packages/pieces/community' - name: Upload Trivy report artifact uses: actions/upload-artifact@v4 with: name: trivy-report path: trivy-report.sarif - name: Upload Trivy scan results to GitHub Security tab uses: github/codeql-action/upload-sarif@v3 with: sarif_file: trivy-report.sarif category: trivy

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/activepieces/activepieces'

If you have feedback or need assistance with the MCP directory API, please join our Discord server