Skip to content

Merge pull request #21 from benschweizer/renovate/actions-setup-go-di… #71

Merge pull request #21 from benschweizer/renovate/actions-setup-go-di…

Merge pull request #21 from benschweizer/renovate/actions-setup-go-di… #71

Workflow file for this run

name: Semgrep
on:
# Scan changed files in PRs, block on new issues only (existing issues ignored)
pull_request: {}
# Scan all files on branches, block on any issues
push:
branches: ["main"]
# Schedule this job to run at a certain time, using cron syntax
# Note that * is a special character in YAML so you have to quote this string
# schedule:
# - cron: '30 0 1,15 * *' # scheduled for 00:30 UTC on both the 1st and 15th of the month
jobs:
semgrep:
name: Scan
runs-on: ubuntu-latest
# Skip any PR created by dependabot to avoid permission issues
if: (github.actor != 'dependabot[bot]')
steps:
# Fetch project source
- uses: actions/checkout@d632683dd7b4114ad314bca15554477dd762a938 # v4.2.0
- uses: semgrep/semgrep-action@713efdd345f3035192eaa63f56867b88e63e4e5d # v1
with:
config: >- # more at semgrep.dev/explore
p/security-audit
p/secrets
p/ci
p/r2c
p/r2c-ci
p/docker
p/dockerfile
p/command-injection
# == Optional settings in the `with:` block
# Instead of `config:`, use rules set in Semgrep App.
# Get your token from semgrep.dev/manage/settings.
# publishToken: {{`${{ secrets.SEMGREP_APP_TOKEN }}`}}
# Never fail the build due to findings on pushes.
# Instead, just collect findings for semgrep.dev/manage/findings
# auditOn: push
# Upload findings to GitHub Advanced Security Dashboard [step 1/2]
# See also the next step.
# generateSarif: "1"
# Change job timeout (default is 1800 seconds; set to 0 to disable)
# env:
# SEMGREP_TIMEOUT: 300
# Upload findings to GitHub Advanced Security Dashboard [step 2/2]
# - name: Upload SARIF file for GitHub Advanced Security Dashboard
# uses: github/codeql-action/upload-sarif@v1
# with:
# sarif_file: semgrep.sarif
# if: always()