-
Notifications
You must be signed in to change notification settings - Fork 75
Ship a GitHub Action for Laravel security scanning #669
Copy link
Copy link
Open
Description
Problem
Teams using Larastan (or no static analysis) have no easy way to add Laravel-aware security scanning to their CI. The plugin requires manual Psalm setup, which is a barrier for security-only adoption.
Proposal
Create a GitHub Action (e.g. psalm/laravel-security-scan) that runs taint analysis on Laravel projects with minimal config:
- uses: psalm/laravel-security-scan@v1It should:
- Install psalm + psalm-plugin-laravel
- Auto-detect Laravel project structure
- Run Psalm with taint analysis
- Report findings as PR annotations (via SARIF or inline comments)
- Fail the check on taint violations (configurable severity threshold)
Why
- New distribution channel outside Packagist — GitHub Marketplace has its own discovery
- One-line setup lowers the adoption barrier dramatically
- Works alongside Larastan without conflict (complementary positioning)
- Every CI run = a composer install, growing the install base organically
- Proven model: Semgrep Action, Bearer Action, and Gitleaks Action all grew this way
Prior art to study
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels