Below you will find pages that utilize the taxonomy term “TomTonic”
April 17, 2026
grype_me
Version updated for https://github.com/TomTonic/grype_me to version v1.3.13-release.
This action is used across all versions by 0 repositories. Action Type This is a Docker action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary This GitHub Action, grype_me, automates vulnerability scanning of a project’s supply chain using Anchore Grype. It identifies known security issues in source dependencies, container images, directories, or SBOMs, and generates dynamic shields.io badges with detailed Markdown reports for easy monitoring. The action is optimized for speed with a pre-downloaded vulnerability database and offers features like nightly release scans, configurable thresholds for failing builds, and reporting only on vulnerabilities with available fixes.
April 13, 2026
grype_me
Version updated for https://github.com/TomTonic/grype_me to version v1.3.12-release.
This action is used across all versions by 0 repositories. Action Type This is a Docker action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The grype_me GitHub Action automates vulnerability scanning for project dependencies, container images, or SBOMs using Anchore Grype. It generates detailed reports and dynamic shields.io badges displaying vulnerability counts, which can be uploaded to GitHub Gists for easy tracking. Key features include daily database updates, multiple scan modes (e.g., latest release, head, or specific artifacts), and the ability to fail builds based on configurable vulnerability thresholds.
April 9, 2026
grype_me
Version updated for https://github.com/TomTonic/grype_me to version v.1.3.12-release.
This action is used across all versions by 0 repositories. Action Type This is a Docker action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary The grype_me GitHub Action automates vulnerability scanning for project supply chains using Anchore Grype, identifying risks in source code dependencies, container images, directories, or SBOMs. It generates detailed vulnerability reports and dynamic shields.io badges that provide an at-a-glance summary of security status, making it ideal for nightly scans of published releases. Key features include pre-bundled vulnerability databases for faster scans, configurable severity thresholds to fail builds, and the ability to focus on vulnerabilities with available fixes.
April 7, 2026
grype_me
Version updated for https://github.com/TomTonic/grype_me to version v1.3.11-release.
This action is used across all versions by 0 repositories. Action Type This is a Docker action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary This GitHub Action, grype_me, automates vulnerability scanning for software projects using Anchore Grype. It supports scanning source code, container images, directories, or SBOM files to identify known vulnerabilities, and generates dynamic shields.io badges linked to detailed reports hosted on GitHub Gists. By simplifying nightly scans, leveraging a pre-downloaded vulnerability database, and providing customizable failure thresholds, it enhances security workflows while saving time and resources.