From 44fbc97f1e9038972eac0975b0dcbc5356b3e15a Mon Sep 17 00:00:00 2001 From: Dawei Huang Date: Wed, 18 Dec 2024 03:08:59 +0000 Subject: [PATCH] no semgrep instead of nosem. --- .github/workflows/codeql-analysis.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml index f2859bf8..d2281487 100644 --- a/.github/workflows/codeql-analysis.yml +++ b/.github/workflows/codeql-analysis.yml @@ -39,7 +39,7 @@ jobs: path: sonic-mgmt-common # Checkout the branch that is being merged into # This workflow has been audited, and no secrets or untrusted code are exposed to the pull_request_target trigger. - ref: ${{ github.event.pull_request.base.ref }} # nosem: yaml.github-actions.security.pull-request-target-code-checkout.pull-request-target-code-checkout + ref: ${{ github.event.pull_request.base.ref }} # nosemgrep: yaml.github-actions.security.pull-request-target-code-checkout.pull-request-target-code-checkout # Update go.mod to use local sonic-mgmt-common. # This is the same hack used in the CI pipeline. See lgtm.yml.