1
+ name : Scorecard supply-chain security
2
+ on :
3
+ # For Branch-Protection check. Only the default branch is supported. See
4
+ # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
5
+ branch_protection_rule :
6
+ # To guarantee Maintained check is occasionally updated. See
7
+ # https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
8
+ schedule :
9
+ - cron : ' 20 7 * * 2'
10
+ push :
11
+ branches : ["main"]
12
+
13
+ # Declare default permissions as read only.
14
+ permissions : read-all
15
+
16
+ jobs :
17
+ analysis :
18
+ name : Scorecard analysis
19
+ runs-on : ubuntu-latest
20
+ permissions :
21
+ # Needed to upload the results to code-scanning dashboard.
22
+ security-events : write
23
+ # Needed to publish results and get a badge (see publish_results below).
24
+ id-token : write
25
+ contents : read
26
+ actions : read
27
+ # To allow GraphQL ListCommits to work
28
+ issues : read
29
+ pull-requests : read
30
+ # To detect SAST tools
31
+ checks : read
32
+
33
+ steps :
34
+
35
+ - name : " Checkout code"
36
+ uses : actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4.3.0
37
+ with :
38
+ persist-credentials : false
39
+
40
+ - name : " Run analysis"
41
+ uses : ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
42
+ with :
43
+ results_file : results.sarif
44
+ results_format : sarif
45
+ # (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
46
+ # - you want to enable the Branch-Protection check on a *public* repository, or
47
+ # - you are installing Scorecards on a *private* repository
48
+ # To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
49
+ # repo_token: ${{ secrets.SCORECARD_TOKEN }}
50
+
51
+ # Public repositories:
52
+ # - Publish results to OpenSSF REST API for easy access by consumers
53
+ # - Allows the repository to include the Scorecard badge.
54
+ # - See https://github.com/ossf/scorecard-action#publishing-results.
55
+ # For private repositories:
56
+ # - `publish_results` will always be set to `false`, regardless
57
+ # of the value entered here.
58
+ publish_results : true
59
+
60
+ # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
61
+ # format to the repository Actions tab.
62
+ - name : " Upload artifact"
63
+ uses : actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
64
+ with :
65
+ name : SARIF file
66
+ path : results.sarif
67
+ retention-days : 5
68
+
69
+ # Upload the results to GitHub's code scanning dashboard.
70
+ - name : " Upload to code-scanning"
71
+ uses : github/codeql-action/upload-sarif@2d92b76c45b91eb80fc44c74ce3fce0ee94e8f9d # v3.30.0
72
+ with :
73
+ sarif_file : results.sarif
0 commit comments