34 lines
1.1 KiB
YAML
34 lines
1.1 KiB
YAML
|
name: Semgrep
|
||
|
on:
|
||
|
# Scan changed files in PRs, block on new issues only (existing issues ignored)
|
||
|
pull_request: {}
|
||
|
push:
|
||
|
branches:
|
||
|
- main
|
||
|
paths:
|
||
|
- .github/workflows/semgrep.yml
|
||
|
schedule:
|
||
|
- cron: '0 0 * * 0'
|
||
|
jobs:
|
||
|
# Update from: https://semgrep.dev/docs/semgrep-ci/sample-ci-configs/#github-actions
|
||
|
semgrep:
|
||
|
name: Scan
|
||
|
runs-on: ubuntu-latest
|
||
|
container:
|
||
|
image: returntocorp/semgrep
|
||
|
if: (github.actor != 'dependabot[bot]')
|
||
|
steps:
|
||
|
- name: Permission issue fix
|
||
|
run: git config --global --add safe.directory /__w/laconicd/laconicd
|
||
|
- uses: actions/checkout@v3
|
||
|
- uses: actions/checkout@v3
|
||
|
- run: semgrep scan --sarif --output=semgrep.sarif --config auto
|
||
|
env:
|
||
|
# Upload findings to GitHub Advanced Security Dashboard [step 1/2]
|
||
|
SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }}
|
||
|
# Upload findings to GitHub Advanced Security Dashboard [step 2/2]
|
||
|
- name: Upload SARIF file
|
||
|
uses: github/codeql-action/upload-sarif@v2
|
||
|
with:
|
||
|
sarif_file: semgrep.sarif
|