Revaer’s image scan workflow uses Trivy, but the repository had no root trivy.yaml.
Trivy automatically reads trivy.yaml from the current working directory, so keeping a repo-local baseline config makes the scan policy explicit and reusable across local and CI invocations.
Decision:
Add a root trivy.yaml that encodes Revaer’s baseline Trivy scan posture.
Keep the baseline conservative and aligned with existing image-scan behavior by scanning for vulnerabilities and secrets, restricting findings to HIGH and CRITICAL, and leaving unfixed vulnerabilities visible.
Consequences:
The repository now has a valid Trivy configuration file that local invocations and CI can share.
Workflow steps can still override output format, SARIF path, and exit-code behavior without forking the underlying baseline policy.
Follow-up:
Re-run Trivy-backed image scans against the repository workflows.
Keep trivy.yaml aligned with future workflow policy changes if scan scope or severity thresholds change.