Skip to content

chore(deps): lock file maintenance #318

chore(deps): lock file maintenance

chore(deps): lock file maintenance #318

Workflow file for this run

name: Security Scans
on:
schedule:
# Run security checks every day at 2 AM UTC
- cron: "0 2 * * *"
workflow_dispatch:
merge_group:
branches:
- master
push:
branches:
- master
- release**
pull_request:
branches:
- master
- release**
concurrency:
group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.sha }}
cancel-in-progress: true
permissions: {}
jobs:
zizmor-scan:
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write # Needed to upload the results to code-scanning dashboard
steps:
- &checkout
name: Checkout code
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
with:
persist-credentials: false
- name: Run Zizmor scan
uses: open-edge-platform/geti-ci/actions/zizmor@d30e32248aa6bd06adeda7129b50a38bdbceca12
with:
scan-scope: ${{ github.event_name == 'pull_request' && 'changed' || 'all' }}
severity-level: "LOW"
confidence-level: "LOW"
fail-on-findings: ${{ github.event_name == 'pull_request' && 'true' || 'false' }}
bandit-scan:
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write # Needed to upload the results to code-scanning dashboard
steps:
- *checkout
- name: Run Bandit scan
uses: open-edge-platform/geti-ci/actions/bandit@d30e32248aa6bd06adeda7129b50a38bdbceca12
with:
scan-scope: ${{ github.event_name == 'pull_request' && 'changed' || 'all' }}
severity-level: "LOW"
confidence-level: "LOW"
config_file: "pyproject.toml"
fail-on-findings: ${{ github.event_name == 'pull_request' && 'true' || 'false' }}
trivy-scan:
runs-on: ubuntu-latest
if: github.event_name != 'pull_request'
permissions:
contents: read
security-events: write # Needed to upload the results to code-scanning dashboard
steps:
- *checkout
- name: Run Trivy scan
uses: open-edge-platform/geti-ci/actions/trivy@d30e32248aa6bd06adeda7129b50a38bdbceca12
with:
scan_type: "fs"
scan-scope: all
severity: LOW
scanners: "vuln,secret,config"
format: "sarif"
timeout: "15m"
ignore_unfixed: "false"
semgrep-scan:
runs-on: ubuntu-latest
permissions:
contents: read
security-events: write # Needed to upload the results to code-scanning dashboard
steps:
- name: Checkout code
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
with:
persist-credentials: false
fetch-depth: 0
- name: Run Semgrep scan
uses: open-edge-platform/geti-ci/actions/semgrep@d30e32248aa6bd06adeda7129b50a38bdbceca12
with:
scan-scope: ${{ github.event_name == 'pull_request' && 'changed' || 'all' }}
severity: "LOW"
fail-on-findings: ${{ github.event_name == 'pull_request' && 'true' || 'false' }}