Skip to content

Ship a GitHub Action for Laravel security scanning #669

@alies-dev

Description

@alies-dev

Problem

Teams using Larastan (or no static analysis) have no easy way to add Laravel-aware security scanning to their CI. The plugin requires manual Psalm setup, which is a barrier for security-only adoption.

Proposal

Create a GitHub Action (e.g. psalm/laravel-security-scan) that runs taint analysis on Laravel projects with minimal config:

- uses: psalm/laravel-security-scan@v1

It should:

  • Install psalm + psalm-plugin-laravel
  • Auto-detect Laravel project structure
  • Run Psalm with taint analysis
  • Report findings as PR annotations (via SARIF or inline comments)
  • Fail the check on taint violations (configurable severity threshold)

Why

  • New distribution channel outside Packagist — GitHub Marketplace has its own discovery
  • One-line setup lowers the adoption barrier dramatically
  • Works alongside Larastan without conflict (complementary positioning)
  • Every CI run = a composer install, growing the install base organically
  • Proven model: Semgrep Action, Bearer Action, and Gitleaks Action all grew this way

Prior art to study

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions