Skip to content

Commit 706ba83

Browse files
fix: add .trivyignore for base-image CVEs and document security
- Add .trivyignore with known base-image vulnerabilities (ubuntu, node, dotnet, go) and expiration dates for re-evaluation on runner upgrades - Use --ignorefile .trivyignore in validate workflow and builder.sh trivy scan - Document inherited base-image vulns and .trivyignore in README (base image + Security) Co-authored-by: Cursor <cursoragent@cursor.com>
1 parent 54334d3 commit 706ba83

4 files changed

Lines changed: 40 additions & 1 deletion

File tree

.github/workflows/validate.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -90,6 +90,7 @@ jobs:
9090
IMAGE_NAME: ${{ steps.manifest.outputs.image_name }}
9191
run: |
9292
trivy image \
93+
--ignorefile .trivyignore \
9394
--severity HIGH,CRITICAL \
9495
--exit-code 1 \
9596
"${IMAGE_NAME}:test"

.trivyignore

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
# Base-image vulnerabilities inherited from ghcr.io/actions/actions-runner.
2+
# These cannot be fixed in this repo; they are tracked here until the upstream
3+
# runner image is updated. See README "Security" and RUNNER_VERSION in manifest.yaml.
4+
# Expiration causes Trivy to re-report after the date so we re-evaluate when
5+
# upgrading the base image (e.g. via Renovate).
6+
#
7+
# Ubuntu (linux-libc-dev / kernel)
8+
CVE-2024-35870 exp:2026-08-19T00:00:00Z
9+
CVE-2024-53179 exp:2026-08-19T00:00:00Z
10+
CVE-2025-37849 exp:2026-08-19T00:00:00Z
11+
CVE-2025-37899 exp:2026-08-19T00:00:00Z
12+
CVE-2025-38118 exp:2026-08-19T00:00:00Z
13+
#
14+
# Node (runner externals/node20)
15+
CVE-2024-21538 exp:2026-08-19T00:00:00Z
16+
CVE-2025-64756 exp:2026-08-19T00:00:00Z
17+
CVE-2026-26996 exp:2026-08-19T00:00:00Z
18+
CVE-2026-23745 exp:2026-08-19T00:00:00Z
19+
CVE-2026-23950 exp:2026-08-19T00:00:00Z
20+
CVE-2026-24842 exp:2026-08-19T00:00:00Z
21+
CVE-2026-26960 exp:2026-08-19T00:00:00Z
22+
#
23+
# .NET (Runner.Plugins / Runner.Sdk deps)
24+
CVE-2024-38095 exp:2026-08-19T00:00:00Z
25+
#
26+
# Go binaries (containerd, containerd-shim-runc-v2, docker-buildx – stdlib)
27+
CVE-2025-68121 exp:2026-08-19T00:00:00Z
28+
CVE-2025-47907 exp:2026-08-19T00:00:00Z
29+
CVE-2025-58183 exp:2026-08-19T00:00:00Z
30+
CVE-2025-61726 exp:2026-08-19T00:00:00Z
31+
CVE-2025-61728 exp:2026-08-19T00:00:00Z
32+
CVE-2025-61729 exp:2026-08-19T00:00:00Z
33+
CVE-2025-61730 exp:2026-08-19T00:00:00Z

README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Container image based on the [GitHub Actions Runner](https://github.com/actions/
66

77
### Base image
88

9-
`ghcr.io/actions/actions-runner` (GitHub Actions Runner)
9+
`ghcr.io/actions/actions-runner` (GitHub Actions Runner). Vulnerability scan results include components inherited from this base (Ubuntu, Node runner externals, .NET runner deps, containerd, docker-buildx). These cannot be fixed in this repo; we track them in [`.trivyignore`](.trivyignore) with expiration dates and rely on upstream runner image upgrades. Base image version is controlled by `RUNNER_VERSION` in [manifest.yaml](manifest.yaml) and is kept up to date by [Renovate](renovate.json). When upgrading the runner version, review Trivy output and remove or extend entries in `.trivyignore` as fixes become available.
1010

1111
### Python
1212

@@ -199,6 +199,10 @@ git commit -m "WIP"
199199
└── login_skopeo.sh # Registry authentication helper
200200
```
201201

202+
## Security
203+
204+
This image is based on [actions/actions-runner](https://github.com/actions/runner). Trivy scans report vulnerabilities in the base image (OS packages, Node runner externals, .NET runner deps, containerd, docker-buildx) that cannot be patched in this repository. Known base-image findings are listed in [`.trivyignore`](.trivyignore) with expiration dates so they are re-evaluated when the base is upgraded. Keep `RUNNER_VERSION` in [manifest.yaml](manifest.yaml) up to date (Renovate opens PRs) and review or remove `.trivyignore` entries when upgrading.
205+
202206
## License
203207

204208
[MIT](LICENSE)

scripts/builder.sh

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -288,6 +288,7 @@ trivy_scan () {
288288
set +e
289289
trivy_scan_exec=$(\
290290
trivy image \
291+
--ignorefile .trivyignore \
291292
--input ${BUILD_DIR}/${IMAGE_NAME}-${IMAGE_TAG}.tar \
292293
--format github \
293294
--severity HIGH,CRITICAL \

0 commit comments

Comments
 (0)