Skip to content

Commit 6c57dd7

Browse files
Merge branch 'main' into vuln-fix-requests
2 parents 1f3b84f + e75a710 commit 6c57dd7

File tree

2 files changed

+38
-3
lines changed

2 files changed

+38
-3
lines changed

.github/workflows/codeql.yml

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,9 @@ on:
1919
schedule:
2020
- cron: '0 0 * * 1'
2121

22+
permissions:
23+
contents: read
24+
2225
jobs:
2326
analyze:
2427
name: Analyze (${{ matrix.language }})
@@ -56,8 +59,13 @@ jobs:
5659
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
5760
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
5861
steps:
62+
- name: Harden the runner (Audit all outbound calls)
63+
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
64+
with:
65+
egress-policy: audit
66+
5967
- name: Checkout repository
60-
uses: actions/checkout@v4
68+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
6169

6270
# Add any setup steps before running the `github/codeql-action/init` action.
6371
# This includes steps like installing compilers or runtimes (`actions/setup-node`
@@ -67,7 +75,7 @@ jobs:
6775

6876
# Initializes the CodeQL tools for scanning.
6977
- name: Initialize CodeQL
70-
uses: github/codeql-action/init@v3
78+
uses: github/codeql-action/init@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
7179
with:
7280
languages: ${{ matrix.language }}
7381
build-mode: ${{ matrix.build-mode }}
@@ -95,6 +103,6 @@ jobs:
95103
exit 1
96104
97105
- name: Perform CodeQL Analysis
98-
uses: github/codeql-action/analyze@v3
106+
uses: github/codeql-action/analyze@4e828ff8d448a8a6e532957b1811f387a63867e8 # v3.29.4
99107
with:
100108
category: "/language:${{matrix.language}}"
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
# Dependency Review Action
2+
#
3+
# This Action will scan dependency manifest files that change as part of a Pull Request,
4+
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
5+
# Once installed, if the workflow run is marked as required,
6+
# PRs introducing known-vulnerable packages will be blocked from merging.
7+
#
8+
# Source repository: https://github.com/actions/dependency-review-action
9+
name: 'Dependency Review'
10+
on: [pull_request]
11+
12+
permissions:
13+
contents: read
14+
15+
jobs:
16+
dependency-review:
17+
runs-on: ubuntu-latest
18+
steps:
19+
- name: Harden the runner (Audit all outbound calls)
20+
uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0
21+
with:
22+
egress-policy: audit
23+
24+
- name: 'Checkout Repository'
25+
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
26+
- name: 'Dependency Review'
27+
uses: actions/dependency-review-action@da24556b548a50705dd671f47852072ea4c105d9 # v4.7.1

0 commit comments

Comments
 (0)