This table represents all evidences across your flows and which evidences are used in each flow.

Flow
backend.security-scan-executed
cli-docker.container-sbom
cli-docker.smoke-test
cli-docker.snyk-container
darwin-amd64.sbom
darwin-arm64.sbom
deb-pkg-amd64.sbom
deb-pkg-arm.sbom
deb-pkg-arm64.sbom
frontend.security-scan-executed
lint
linux-amd64.sbom
linux-arm.sbom
linux-arm64.sbom
never-alone-data
never-alone-trail
pr
pull-request
release-approval
rpm-pkg-amd64.sbom
rpm-pkg-arm.sbom
rpm-pkg-arm64.sbom
security-scan-vulnerability-summary
snyk-code
staging-software
test
windows-amd64.sbom
windows-arm.sbom
windows-arm64.sbom
work-reference
tick tick tick tick tick tick tick tick
tick tick tick tick tick tick tick tick tick tick tick tick tick tick tick tick tick tick tick tick
tick tick
tick tick
tick tick
tick tick
tick tick
tick tick
tick