{"id":3438,"date":"2025-08-22T17:22:54","date_gmt":"2025-08-22T14:22:54","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/"},"modified":"2025-08-22T17:22:54","modified_gmt":"2025-08-22T14:22:54","slug":"automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/","title":{"rendered":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In today\u2019s fast-paced development environment, security must remain a top priority, especially with the rise in cyber threats. Integrating automated vulnerability scans into your CI\/CD (Continuous Integration\/Continuous Deployment) pipelines can help detect vulnerabilities early, minimizing the risk of exploitable code making it to production. This article explores how to automate vulnerability scans on Linux servers using popular tools and practices.<\/p>\n<p><\/p>\n<h2>Why Automate Vulnerability Scans?<\/h2>\n<p><\/p>\n<ol><\/p>\n<li><strong>Early Detection<\/strong>: Catching vulnerabilities during the development phase can save time and resources compared to addressing them post-deployment.<\/li>\n<p><\/p>\n<li><strong>Consistency<\/strong>: Automated scans reduce human error and ensure that every application, regardless of its complexity, undergoes the same rigorous security checks.<\/li>\n<p><\/p>\n<li><strong>Compliance<\/strong>: Many industries require frequent security assessments to comply with regulations.<\/li>\n<p><\/p>\n<li><strong>Integration<\/strong>: Seamless incorporation of security into the CI\/CD pipeline ensures that security is everyone&#8217;s responsibility.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Tools for Vulnerability Scanning<\/h2>\n<p><\/p>\n<p>Several tools can assist in automating vulnerability scans in your CI\/CD pipeline:<\/p>\n<p><\/p>\n<h3>1. <strong>OpenVAS<\/strong><\/h3>\n<p><\/p>\n<p>OpenVAS (Open Vulnerability Assessment System) is an open-source vulnerability scanner. It provides a full-featured vulnerability scanning and management solution. <\/p>\n<p><\/p>\n<p><strong>Installation<\/strong>:<br \/>\nbash<br \/>\nsudo apt update<br \/>\nsudo apt install openvas<\/p>\n<p><\/p>\n<p><strong>Setting Up<\/strong>:<br \/>\nbash<br \/>\nsudo openvas-setup<\/p>\n<p><\/p>\n<h3>2. <strong>Nessus<\/strong><\/h3>\n<p><\/p>\n<p>Nessus is a popular commercial vulnerability scanner. It provides a wide range of tests for vulnerabilities and is known for its ease of use.<\/p>\n<p><\/p>\n<h3>3. <strong>Trivy<\/strong><\/h3>\n<p><\/p>\n<p>Trivy is a simple and comprehensive container vulnerability scanner for developers and DevOps. It targets vulnerabilities in OS packages and application dependencies.<\/p>\n<p><\/p>\n<p><strong>Installation<\/strong>:<br \/>\nbash<br \/>\nsudo apt install trivy<\/p>\n<p><\/p>\n<h3>4. <strong>Anchore Engine<\/strong><\/h3>\n<p><\/p>\n<p>Anchore Engine is an open-source tool that allows you to perform deep image scanning and policy enforcement in containerized environments.<\/p>\n<p><\/p>\n<h2>Automating Scanning in CI\/CD<\/h2>\n<p><\/p>\n<h3>Setup a CI\/CD Pipeline<\/h3>\n<p><\/p>\n<p>We&#8217;ll use <strong>GitLab CI<\/strong> as an example, but the same concepts can be applied to other CI\/CD tools such as Jenkins or GitHub Actions.<\/p>\n<p><\/p>\n<ol><\/p>\n<li><strong>Create a .gitlab-ci.yml file<\/strong> in your repository.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<p>yaml<br \/>\nstages:<\/p>\n<p><\/p>\n<ul><\/p>\n<li>build<\/li>\n<p><\/p>\n<li>test<\/li>\n<p><\/p>\n<li>security<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>variables:<br \/>\nTRIVY_IMAGE: &#8220;aquasec\/trivy:latest&#8221;<\/p>\n<p><\/p>\n<p>build:<br \/>\nstage: build<br \/>\nscript:<\/p>\n<p><\/p>\n<ul><\/p>\n<li>echo &#8220;Building the application&#8230;&#8221;<\/li>\n<p><\/p>\n<li>\n<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>test:<br \/>\nstage: test<br \/>\nscript:<\/p>\n<p><\/p>\n<ul><\/p>\n<li>echo &#8220;Running tests&#8230;&#8221;<\/li>\n<p><\/p>\n<li>\n<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<p>security_scan:<br \/>\nstage: security<br \/>\nimage: $TRIVY_IMAGE<br \/>\nscript:<\/p>\n<p><\/p>\n<ul><\/p>\n<li>trivy image &#8211;exit-code 1 &#8211;severity HIGH,CRITICAL myapp:latest<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h3>Explanation of the Pipeline<\/h3>\n<p><\/p>\n<ul><\/p>\n<li><strong>Stages<\/strong>: Defines three stages &#8211; build, test, and security.<\/li>\n<p><\/p>\n<li><strong>Build Stage<\/strong>: This is where the code gets compiled or built.<\/li>\n<p><\/p>\n<li><strong>Test Stage<\/strong>: This is where unit tests and integration tests are executed.<\/li>\n<p><\/p>\n<li><strong>Security Scan<\/strong>: We utilize Trivy here to scan the image created in the build stage for high-risk vulnerabilities. The pipeline will fail if vulnerabilities are found at the <code>HIGH<\/code> or <code>CRITICAL<\/code> levels.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h3>Running the Pipeline<\/h3>\n<p><\/p>\n<ul><\/p>\n<li>Push your changes to GitLab, and the pipeline will execute automatically, running all defined stages.<\/li>\n<p><\/p>\n<li>If a vulnerability is found, the scan will halt the deployment process until the issues are resolved.<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h2>Best Practices<\/h2>\n<p><\/p>\n<ol><\/p>\n<li><strong>Define Sensible Thresholds<\/strong>: Not all vulnerabilities require immediate action. Define thresholds for severities that make sense for your organization.<\/li>\n<p><\/p>\n<li><strong>Schedule Regular Scans<\/strong>: In addition to scans triggered by CI\/CD processes, schedule routine scans on production systems.<\/li>\n<p><\/p>\n<li><strong>Integrate Reporting Tools<\/strong>: Use tools like Jira or Slack to notify relevant team members about findings from the scans.<\/li>\n<p><\/p>\n<li><strong>Educate Your Team<\/strong>: Ensure that developers understand the importance of security and are trained to address and remediate vulnerabilities.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h2>Conclusion<\/h2>\n<p><\/p>\n<p>Automating vulnerability scans in your CI\/CD pipeline serves as a necessary layer of security, enabling organizations to develop and deploy applications confidently. By integrating tools like Trivy or OpenVAS into your pipeline, you can ensure that vulnerabilities are addressed before they reach production, thereby enhancing your overall security posture.<\/p>\n<p><\/p>\n<p>As threats evolve, staying proactive in your approach to security will keep your organizations safe and secure. Ensure that security checks are embedded in your workflow, transforming security from a hurdle to an integral part of the development lifecycle. <\/p>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<p>By implementing these practices, organizations can effectively reduce their risk profile and foster a culture of security-minded development. Leverage the power of automation and ensure your CI\/CD pipeline is not just fast but also secure.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s fast-paced development environment, security must remain a top priority, especially with the rise in cyber threats. Integrating automated vulnerability scans into your CI\/CD (Continuous Integration\/Continuous Deployment) pipelines can help detect vulnerabilities early, minimizing the risk of exploitable code making it to production. This article explores how to automate vulnerability scans on Linux servers [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3439,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[386,960,265,890,1026,302,944],"class_list":["post-3438","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-automating","tag-cicd","tag-linux","tag-pipelines","tag-scans","tag-servers","tag-vulnerability","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers\" \/>\n<meta property=\"og:description\" content=\"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-22T14:22:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2221\" \/>\n\t<meta property=\"og:image:height\" content=\"482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Automating Vulnerability Scans in CI\\\/CD Pipelines on Linux Servers\",\"datePublished\":\"2025-08-22T14:22:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/\"},\"wordCount\":663,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png\",\"keywords\":[\"Automating\",\"CICD\",\"Linux\",\"Pipelines\",\"Scans\",\"Servers\",\"Vulnerability\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/\",\"name\":\"Automating Vulnerability Scans in CI\\\/CD Pipelines on Linux Servers - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png\",\"datePublished\":\"2025-08-22T14:22:54+00:00\",\"description\":\"Automating Vulnerability Scans in CI\\\/CD Pipelines on Linux Servers %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server automating vulnerability scans in CI\\\/CD pipelines\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Automating Vulnerability Scans in CI\\\/CD Pipelines on Linux Servers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers - WafaTech Blogs","description":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/","og_locale":"en_US","og_type":"article","og_title":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers","og_description":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2025-08-22T14:22:54+00:00","og_image":[{"width":2221,"height":482,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","type":"image\/webp"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers","datePublished":"2025-08-22T14:22:54+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/"},"wordCount":663,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png","keywords":["Automating","CICD","Linux","Pipelines","Scans","Servers","Vulnerability"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/","name":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png","datePublished":"2025-08-22T14:22:54+00:00","description":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png","width":1024,"height":1024,"caption":"linux server automating vulnerability scans in CI\/CD pipelines"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/automating-vulnerability-scans-in-ci-cd-pipelines-on-linux-servers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Automating Vulnerability Scans in CI\/CD Pipelines on Linux Servers"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2025\/08\/Automating-Vulnerability-Scans-in-CICD-Pipelines-on-Linux-Servers.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/3438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=3438"}],"version-history":[{"count":0,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/3438\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/3439"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=3438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=3438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=3438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}