@@ -70,10 +70,10 @@ jobs:
7070 id : job-start
7171 run : echo "start_time=$(date +%s)" >> $GITHUB_OUTPUT
7272
73- - uses : actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
73+ - uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
7474
7575 - name : Set up Python 3.12
76- uses : actions/setup-python@83679a892e2d95755f2dac6acb0bfd1e9ac5d548 # v6.1 .0
76+ uses : actions/setup-python@a309ff8b426b58ec0e2a45f0f869d46889d02405 # v6.2 .0
7777 with :
7878 python-version : " 3.12"
7979 cache : " pip"
@@ -226,14 +226,14 @@ jobs:
226226
227227 steps :
228228 - name : Checkout repository
229- uses : actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
229+ uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
230230
231231 # Initialize CodeQL: Sets up the CodeQL analysis environment
232232 # and prepares the database for semantic code analysis.
233233 # Uses custom configuration for enhanced security coverage.
234234 # The config file specifies both security-extended and security-and-quality query suites.
235235 - name : Initialize CodeQL
236- uses : github/codeql-action/init@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6
236+ uses : github/codeql-action/init@b20883b0cd1f46c72ae0ba6d1090936928f9fa30 # v4.32.0
237237 with :
238238 languages : ${{ matrix.language }}
239239 config-file : ./.github/codeql/codeql-config.yml
@@ -253,7 +253,7 @@ jobs:
253253 # Results can be viewed in the Security > Code scanning alerts tab
254254 - name : Perform CodeQL Analysis
255255 id : analyze
256- uses : github/codeql-action/analyze@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6
256+ uses : github/codeql-action/analyze@b20883b0cd1f46c72ae0ba6d1090936928f9fa30 # v4.32.0
257257 with :
258258 category : " /language:${{matrix.language}}" # Categorize results by language
259259 upload : true # Upload SARIF results to GitHub Security tab
@@ -307,7 +307,7 @@ jobs:
307307
308308 steps :
309309 - name : Checkout repository
310- uses : actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
310+ uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
311311
312312 # Run Trivy vulnerability scanner on filesystem
313313 # Scans dependencies and source code for known vulnerabilities
@@ -325,7 +325,7 @@ jobs:
325325 # Upload Trivy results to GitHub Security tab
326326 # Always runs even if scan fails, to ensure visibility
327327 - name : Upload Trivy results to GitHub Security
328- uses : github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6
328+ uses : github/codeql-action/upload-sarif@b20883b0cd1f46c72ae0ba6d1090936928f9fa30 # v4.32.0
329329 if : always() # Upload even if scan found vulnerabilities
330330 with :
331331 sarif_file : ' trivy-results.sarif'
@@ -382,7 +382,7 @@ jobs:
382382
383383 steps :
384384 - name : Checkout repository
385- uses : actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
385+ uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
386386 with :
387387 fetch-depth : 0 # Fetch full git history for comprehensive secret scanning
388388
@@ -482,7 +482,7 @@ jobs:
482482
483483 steps :
484484 - name : Checkout repository
485- uses : actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
485+ uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
486486 with :
487487 persist-credentials : false # Don't persist GitHub token
488488
@@ -498,7 +498,7 @@ jobs:
498498 # Upload Scorecard results to GitHub Security tab
499499 # Always uploads to track score trends over time
500500 - name : Upload Scorecard results to GitHub Security
501- uses : github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6
501+ uses : github/codeql-action/upload-sarif@b20883b0cd1f46c72ae0ba6d1090936928f9fa30 # v4.32.0
502502 if : always() # Upload even if score is below threshold
503503 with :
504504 sarif_file : scorecard-results.sarif
0 commit comments