From 50faefde2912d761d2604d164548043c83827ba3 Mon Sep 17 00:00:00 2001 From: yogur Date: Thu, 22 Aug 2024 15:03:33 +0200 Subject: [PATCH] [skip ci] Add security code scanning workflow --- .github/workflows/codeql-analysis.yml | 22 ---------------------- .github/workflows/security-analysis.yml | 24 ++++++++++++++++++++++++ 2 files changed, 24 insertions(+), 22 deletions(-) delete mode 100644 .github/workflows/codeql-analysis.yml create mode 100644 .github/workflows/security-analysis.yml diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml deleted file mode 100644 index deb08eeb06..0000000000 --- a/.github/workflows/codeql-analysis.yml +++ /dev/null @@ -1,22 +0,0 @@ -name: "CodeQL" - -on: - # workflow_dispatch enables manual triggering of the workflow - workflow_dispatch: - schedule: - - cron: '16 23 * * 6' -jobs: - analyze: - name: Analyze - runs-on: ubuntu-latest - permissions: - actions: read - contents: read - security-events: write - - steps: - - name: S24 static application security testing (SAST) action - uses: scout24/s24-sast-action@v1 - with: - languages: javascript - diff --git a/.github/workflows/security-analysis.yml b/.github/workflows/security-analysis.yml new file mode 100644 index 0000000000..7ce66f088d --- /dev/null +++ b/.github/workflows/security-analysis.yml @@ -0,0 +1,24 @@ +name: "Security Static Analysis" + +on: + pull_request: {} + workflow_dispatch: {} + push: + branches: + - main + - master + schedule: + - cron: '42 6 22 * *' +jobs: + scan: + name: "Security Static Analysis" + runs-on: ubuntu-latest + + # Skip any PR created by dependabot: + if: (github.actor != 'dependabot[bot]') + + steps: + - uses: scout24/s24-sast-action@v2 + with: + SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }} +