ci: add Pip-Audit dependency vulnerability scanner#12
Merged
Conversation
Scans requirements.txt against OSV database (PyPI Advisory DB + OSV.dev) for known CVEs in Python dependencies. Uses pypa/gh-action-pip-audit pinned to SHA (v1.1.0). Audit notes: - Changed schedule from daily to weekly Saturday 03:00 UTC (proportionate for a project with 15 stable deps; daily would be noisy) - Kept contents:read only — no SARIF upload needed (pip-audit reports inline via the action's built-in GitHub annotations) - Pinned third-party action to full SHA per supply-chain best practice Triggers: push to main, pull requests, weekly Saturday 03:00 UTC.
There was a problem hiding this comment.
Pull request overview
Adds a dedicated GitHub Actions workflow to run pip-audit against the repository’s Python dependencies, providing automated vulnerability checks against OSV/PyPI advisories.
Changes:
- Introduces a new
Pip-Auditworkflow triggered on push/PR tomainand on a weekly schedule. - Uses a SHA-pinned
pypa/gh-action-pip-auditaction and least-privilege permissions.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
Comment on lines
+34
to
+36
| - name: Run pip-audit | ||
| uses: pypa/gh-action-pip-audit@ecbf276b5d286618e939b4f3a26cd27791e8a1dd # v1.1.0 | ||
| with: |
There was a problem hiding this comment.
PR description says the action is pinned to SHA cbf276b (v1.1.0), but the workflow pins pypa/gh-action-pip-audit to ecbf276b5d286618e939b4f3a26cd27791e8a1dd. Please align the PR description with the actual pinned SHA (or update the SHA here if the description is the intended one) so reviewers can verify the supply-chain pin confidently.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Pip-Audit Dependency Scanner
Scans requirements.txt against the OSV database (PyPI Advisory DB + OSV.dev) for known CVEs in Python dependencies.
Audit Fixes Applied
Trigger Matrix
How It Works
The action installs deps from requirements.txt in an isolated venv, queries OSV.dev for advisories, and reports findings as inline GitHub annotations. No SARIF upload needed — results appear directly on the PR diff.