Skip to content

CI -> Security

CI -> Security #260

Workflow file for this run

name: CI -> Security
on:
branch_protection_rule:
schedule:
- cron: 33 3 * * 1
push:
branches:
- dev
paths-ignore:
- '*.md'
- '.*ignore'
pull_request:
branches:
- dev
paths-ignore:
- '*.md'
- '.*ignore'
permissions: read-all
jobs:
codeql:
name: CodeQL
runs-on: ubuntu-24.04
strategy:
fail-fast: false
matrix:
include:
- language: javascript-typescript
build-mode: none
permissions:
security-events: write
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
with:
persist-credentials: false
- name: Setup CodeQL
uses: github/codeql-action/init@8214744c546c1e5c8f03dde8fab3a7353211988d # v3.26.7
with:
languages: ${{ matrix.language }}
build-mode: ${{ matrix.build-mode }}
- name: Run analysis
uses: github/codeql-action/analyze@8214744c546c1e5c8f03dde8fab3a7353211988d # v3.26.7
with:
category: /language:${{matrix.language}}
scoreboard:
name: Scorecard
runs-on: ubuntu-24.04
permissions:
security-events: write
id-token: write
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v2.10.1
with:
egress-policy: audit
- name: Checkout
uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332 # v4.1.7
with:
persist-credentials: false
- name: Run analysis
uses: ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
with:
results_file: scoreboard.sarif
results_format: sarif
publish_results: true
- name: Upload to code-scanning
uses: github/codeql-action/upload-sarif@8214744c546c1e5c8f03dde8fab3a7353211988d # v3.26.7
with:
sarif_file: scoreboard.sarif