Skip to content

bryk-io/govuln-scan-action

Use this GitHub action with your project
Add this Action to an existing workflow or create a new one
View on Marketplace

GitHub Action: Go Vulnerabilities Scan

Status Version Software License Contributor Covenant

Go provides tooling to analyze your codebase and surface known vulnerabilities. This tooling is backed by the Go vulnerability database, which is curated by the Go security team. Go’s tooling reduces noise in your results by only surfacing vulnerabilities in functions that your code is actually calling.

Important: The go version used to build govulncheck must match the version used in your project. Use the input go-version to specify the version to be used. If not provided the latest version available will be used by default.

For more information about this requirement please refer to this issue golang/go#55045.

More information: Vulnerability Management for Go.

Usage

Sample step configuration.

steps:
  # Vulnerabilities scan
  - name: Go vulnerabilities scan
    uses: bryk-io/govuln-scan-action@v0.2.0

Workflow

Sample workflow file.

name: scan
on:
  # To manually run
  workflow_dispatch: {}
  # To automatically run for all commits on branch 'main'
  push:
    branches:
      - main
jobs:
  # govulncheck scan
  scan:
    runs-on: ubuntu-latest
    timeout-minutes: 10
    steps:
      # Checkout code
      - name: Checkout repository
        uses: actions/checkout@v3

      # Vulnerabilities scan
      - name: Go vulnerabilities scan
        uses: bryk-io/govuln-scan-action@v0.2.0
        with:
          go-version: "1.20" # optional

To manually trigger this workflow using GitHub's CLI tool.

gh workflow run scan

About

Low-noise and reliable Go vulnerabilities scan using the official database (https://vuln.go.dev).

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors