From 1ccc74e91617a24615a1abd33387a43b146d8812 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Fran=C3=A7ois=20Proulx?= <76956526+fproulx-boostsecurity@users.noreply.github.com> Date: Mon, 15 Apr 2024 07:40:33 -0700 Subject: [PATCH] Update action to v0.9.10 (#4) * Update action to v0.9.10 Also update the README * Update Dockerfile --- Dockerfile | 2 +- README.md | 7 ++++++- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/Dockerfile b/Dockerfile index 4fdf6d3..425a2ac 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,4 +1,4 @@ -FROM ghcr.io/boostsecurityio/poutine:0.9.9@sha256:e5790a12cb19c1433fee835e7b03f9e4051efb872bfc3d1c2a555767fbb65a70 +FROM ghcr.io/boostsecurityio/poutine:0.9.10@sha256:74856385aadf2873389fcaac676551c7c7315d13e744d06fd645890e7794c6e7 USER root diff --git a/README.md b/README.md index 3ebc419..4903c58 100644 --- a/README.md +++ b/README.md @@ -1,2 +1,7 @@ # poutine-action -boostsecurityio/poutine-action + +This is a simple GitHub Action to simplify using poutine as part of GitHub Actions workflows. + +Created by BoostSecurity.io, poutine is a security scanner that detects misconfigurations and vulnerabilities in the build pipelines of a repository. It supports parsing CI workflows from GitHub Actions and Gitlab CI/CD. When given an access token with read-level access, poutine can analyze all the repositories of an organization to quickly gain insights into the security posture of the organization's software supply chain. + +Visit https://github.com/boostsecurityio/poutine for more details about poutine itself.