I have enabled continuous export in Azure Security Center to export the Container Vulnerability Recommendations to a Log Analytics workspace that is connected to Sentinel. That works, I can query the SecurityNestedRecommendation table.
I then created an analytics rule which has an automated response (incident automation), which is a playbook and is connected to an automation rule.
The logic app (playbook) is a simple flow that uses the "When Azure Sentinel incident creation rule was triggered" trigger and a teams "Post message in chat or channel" action.
When I build an push a new image to my ACR I see the adjustment of the recommendation (new image is added) and a bit later on in Sentinel an incident has been created, but my automated incident response playbook is not triggered and I have no clue why :-).