Skip to content

ci: add Pip-Audit dependency vulnerability scanner#12

Merged
habanwer merged 1 commit intomainfrom
ci/pip-audit
Mar 11, 2026
Merged

ci: add Pip-Audit dependency vulnerability scanner#12
habanwer merged 1 commit intomainfrom
ci/pip-audit

Conversation

@habanwer
Copy link
Member

Pip-Audit Dependency Scanner

Scans requirements.txt against the OSV database (PyPI Advisory DB + OSV.dev) for known CVEs in Python dependencies.

Audit Fixes Applied

  • Changed schedule from daily to weekly — Saturday 03:00 UTC; 15 stable deps don't need daily scanning
  • SHA-pinned pypa/gh-action-pip-audit to \�cbf276b\ (v1.1.0)
  • Top-level permissions reset — \permissions: {}\ then only \contents: read\

Trigger Matrix

Event Scope
push main branch
pull_request main branch
schedule Saturday 03:00 UTC

How It Works

The action installs deps from requirements.txt in an isolated venv, queries OSV.dev for advisories, and reports findings as inline GitHub annotations. No SARIF upload needed — results appear directly on the PR diff.

Scans requirements.txt against OSV database (PyPI Advisory DB + OSV.dev)
for known CVEs in Python dependencies.

Uses pypa/gh-action-pip-audit pinned to SHA (v1.1.0).

Audit notes:
- Changed schedule from daily to weekly Saturday 03:00 UTC (proportionate
  for a project with 15 stable deps; daily would be noisy)
- Kept contents:read only — no SARIF upload needed (pip-audit reports
  inline via the action's built-in GitHub annotations)
- Pinned third-party action to full SHA per supply-chain best practice

Triggers: push to main, pull requests, weekly Saturday 03:00 UTC.
Copilot AI review requested due to automatic review settings March 11, 2026 00:23
@habanwer habanwer merged commit 2ce8efd into main Mar 11, 2026
7 of 12 checks passed
@habanwer habanwer deleted the ci/pip-audit branch March 11, 2026 00:23
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds a dedicated GitHub Actions workflow to run pip-audit against the repository’s Python dependencies, providing automated vulnerability checks against OSV/PyPI advisories.

Changes:

  • Introduces a new Pip-Audit workflow triggered on push/PR to main and on a weekly schedule.
  • Uses a SHA-pinned pypa/gh-action-pip-audit action and least-privilege permissions.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +34 to +36
- name: Run pip-audit
uses: pypa/gh-action-pip-audit@ecbf276b5d286618e939b4f3a26cd27791e8a1dd # v1.1.0
with:
Copy link

Copilot AI Mar 11, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

PR description says the action is pinned to SHA cbf276b (v1.1.0), but the workflow pins pypa/gh-action-pip-audit to ecbf276b5d286618e939b4f3a26cd27791e8a1dd. Please align the PR description with the actual pinned SHA (or update the SHA here if the description is the intended one) so reviewers can verify the supply-chain pin confidently.

Copilot uses AI. Check for mistakes.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants