Skip to content

Apply suggestions from code review #4

Apply suggestions from code review

Apply suggestions from code review #4

# Dependency Review Action
#
# This Action will scan dependency manifest files that change as part of a Pull Request,
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
# Once installed, if the workflow run is marked as required,
# PRs introducing known-vulnerable packages will be blocked from merging.
#
# Source repository: https://github.com/actions/dependency-review-action
name: Security - Dependency Review
on:
merge_group:
pull_request:
permissions:
contents: read
jobs:
dependency-review:
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@eb238b55efaa70779f274895e782ed17c84f2895 # v2.6.1
with:
egress-policy: audit
# checks out the repository
- uses: actions/checkout@v4
with:
submodules: 'recursive'
token: ${{ secrets.BOT_TOKEN || github.token }} # Bot Token is a PAT for a automation account.
- name: 'Dependency Review'
+ uses: actions/[email protected]
uses: actions/dependency-review-action@0efb1d1d84fc9633afcdaad14c485cbbc90ef46c # v2.5.1

Check failure on line 35 in .github/workflows/security-dependency-review.yml

View workflow run for this annotation

GitHub Actions / .github/workflows/security-dependency-review.yml

Invalid workflow file

You have an error in your yaml syntax on line 35