From 0099d6a01db3b16bec8217d57db7cd3aa310832f Mon Sep 17 00:00:00 2001 From: egashi Date: Fri, 15 Aug 2025 15:56:02 +0200 Subject: [PATCH] [skip ci] Add security code scanning workflow --- .github/workflows/codeql-analysis.yml | 22 ---------------------- .github/workflows/security-analysis.yml | 16 ++++++++++++++++ 2 files changed, 16 insertions(+), 22 deletions(-) delete mode 100644 .github/workflows/codeql-analysis.yml create mode 100644 .github/workflows/security-analysis.yml diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml deleted file mode 100644 index deb08eeb06..0000000000 --- a/.github/workflows/codeql-analysis.yml +++ /dev/null @@ -1,22 +0,0 @@ -name: "CodeQL" - -on: - # workflow_dispatch enables manual triggering of the workflow - workflow_dispatch: - schedule: - - cron: '16 23 * * 6' -jobs: - analyze: - name: Analyze - runs-on: ubuntu-latest - permissions: - actions: read - contents: read - security-events: write - - steps: - - name: S24 static application security testing (SAST) action - uses: scout24/s24-sast-action@v1 - with: - languages: javascript - diff --git a/.github/workflows/security-analysis.yml b/.github/workflows/security-analysis.yml new file mode 100644 index 0000000000..3bfece6007 --- /dev/null +++ b/.github/workflows/security-analysis.yml @@ -0,0 +1,16 @@ +name: "Security Static Analysis" + +on: + pull_request: {} + workflow_dispatch: {} + schedule: + - cron: '15 2 10 * *' +jobs: + scan: + uses: scout24/s24-sast-action/.github/workflows/security-analysis.yml@v3 + + secrets: + GH_TOKEN: ${{ secrets.GITHUB_TOKEN }} + SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }} + GITLEAKS_LICENSE: ${{ secrets.GITLEAKS_LICENSE }} +