From 64fdc879fbfdfc1921842b2ea9d613f60b115ef5 Mon Sep 17 00:00:00 2001 From: yogur Date: Thu, 22 Aug 2024 15:03:05 +0200 Subject: [PATCH] [skip ci] Add security code scanning workflow --- .github/workflows/codeql-analysis.yml | 22 ---------------------- .github/workflows/security-analysis.yml | 24 ++++++++++++++++++++++++ 2 files changed, 24 insertions(+), 22 deletions(-) delete mode 100644 .github/workflows/codeql-analysis.yml create mode 100644 .github/workflows/security-analysis.yml diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml deleted file mode 100644 index 693b069..0000000 --- a/.github/workflows/codeql-analysis.yml +++ /dev/null @@ -1,22 +0,0 @@ -name: "CodeQL" - -on: - # workflow_dispatch enables manual triggering of the workflow - workflow_dispatch: - schedule: - - cron: '8 2 * * 4' -jobs: - analyze: - name: Analyze - runs-on: ubuntu-latest - permissions: - actions: read - contents: read - security-events: write - - steps: - - name: S24 static application security testing (SAST) action - uses: scout24/s24-sast-action@v1 - with: - languages: python - diff --git a/.github/workflows/security-analysis.yml b/.github/workflows/security-analysis.yml new file mode 100644 index 0000000..74b0a0a --- /dev/null +++ b/.github/workflows/security-analysis.yml @@ -0,0 +1,24 @@ +name: "Security Static Analysis" + +on: + pull_request: {} + workflow_dispatch: {} + push: + branches: + - main + - master + schedule: + - cron: '3 22 2 * *' +jobs: + scan: + name: "Security Static Analysis" + runs-on: ubuntu-latest + + # Skip any PR created by dependabot: + if: (github.actor != 'dependabot[bot]') + + steps: + - uses: scout24/s24-sast-action@v2 + with: + SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }} +