@@ -90,7 +90,7 @@ Perform the following steps to quickly add this action to your GitHub Actions pi
9090 # modify this block to scan your intended artifact
9191 - name : Inspector Scan
9292 id : inspector
93- uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
93+ uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
9494 with :
9595 # change artifact_type to either 'repository', 'container', 'binary', or 'archive'.
9696 artifact_type : ' repository'
@@ -175,7 +175,7 @@ The below example shows how to enable action outputs in various locations and fo
175175` ` ` yaml
176176- name : Scan container
177177 id : inspector
178- uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
178+ uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1
179179 with :
180180 artifact_type : ' container'
181181 artifact_path : ' ubuntu:14.04'
@@ -219,7 +219,7 @@ The example below shows how to set up vulnerability thresholds and fail the job
219219` ` ` yaml
220220- name : Invoke Amazon Inspector Scan
221221 id : inspector
222- uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
222+ uses : aws/vulnerability-scan-github-action-for-amazon-inspector@v1
223223 with :
224224 artifact_type : ' repository'
225225 artifact_path : ' ./'
@@ -294,7 +294,7 @@ jobs:
294294 role-to-assume : " arn:aws:iam::<AWS_ACCOUNT_ID>:role/<IAM_ROLE_NAME>"
295295
296296 - name : Scan built image with Inspector
297- uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1.0.0
297+ uses : aws-actions/vulnerability-scan-github-action-for-amazon-inspector@v1
298298 id : inspector
299299 with :
300300 artifact_type : ' container'
0 commit comments