Skip to content

Commit d77656f

Browse files
Update content/enterprise-onboarding/github-actions-for-your-enterprise/security-hardening-for-github-actions.md
1 parent f3d1e1a commit d77656f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/enterprise-onboarding/github-actions-for-your-enterprise/security-hardening-for-github-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,7 @@ Avoid using the `pull_request_target` and `workflow_run` workflow triggers with
174174

175175
### Use CodeQL to detect potentially vulnerable workflows
176176

177-
[CodeQL](/code-security/code-scanning/introduction-to-code-scanning/about-code-scanning-with-codeql) can scan and detect potentially vulnerable GitHub Actions workflows. [Configure the default setup for CodeQL](/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning) for the repository and ensure that GitHub Actions scanning is enabled.
177+
[CodeQL](/code-security/code-scanning/introduction-to-code-scanning/about-code-scanning-with-codeql) can scan and detect potentially vulnerable {% data variables.product.prodname_actions %} workflows. [Configure the default setup for CodeQL](/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning) for the repository and ensure that {% data variables.product.prodname_actions %} scanning is enabled.
178178

179179
### Use OpenSSF Scorecards to detect potentially vulnerable workflows
180180

0 commit comments

Comments
 (0)