From b6c21ce1a9419ebb170839ea6d54953f3576e5db Mon Sep 17 00:00:00 2001 From: James Brotsos Date: Wed, 17 Sep 2025 19:38:16 -0700 Subject: [PATCH 1/2] Update test label from 'Test4' to 'Test5' --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 8cbb07f..aae7d32 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # Vulnerable Test Application -Test4 +Test5 This is a deliberately vulnerable Node.js application designed for testing container vulnerability scanning tools like Trivy. From e89c1bcfb54ef57680a5fb0969be55b0f7bdd96e Mon Sep 17 00:00:00 2001 From: James Brotsos Date: Wed, 17 Sep 2025 19:44:13 -0700 Subject: [PATCH 2/2] Clean up parameters in msdo-scan.yml --- .github/workflows/msdo-scan.yml | 2 -- 1 file changed, 2 deletions(-) diff --git a/.github/workflows/msdo-scan.yml b/.github/workflows/msdo-scan.yml index 121692d..0d2094c 100644 --- a/.github/workflows/msdo-scan.yml +++ b/.github/workflows/msdo-scan.yml @@ -35,8 +35,6 @@ jobs: uses: microsoft/security-devops-action@latest with: tools: 'checkov' - source-root: vulnerable-infra - output-path: results env: GDN_CHECKOV_TARGETDIRECTORY: ${{ github.workspace }}/vulnerable-infra