-
Notifications
You must be signed in to change notification settings - Fork 5.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add workflow for behavioral analysis of dependencies #1516
Conversation
@varunsh-coder we are on a pause on accepting new starter-workflows for CI or automation. Code-scanning PRs are accepted. Refer: #631 |
Thanks @Phantsure. While this does not scan code, it does analyze dependencies and is related to security. From the developer’s perspective, does it make sense to add it to code scanning category? If not, should I close the PR, or let it be open until the pause for accepting new starter-workflows is unpaused... |
@varunsh-coder It seems a better fit in code scanning. You can move to that. Thanks |
Changed the category to dependency review to better align with what it does.
Thanks @Phantsure. I have moved it into code scanning. I saw there was new category called |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me
This pull request has become stale and will be closed automatically within a period of time. Sorry about that. |
This pull request has become stale and will be closed automatically within a period of time. Sorry about that. |
Pre-requisites
Please note that at this time we are only accepting new starter workflows for Code Scanning. Updates to existing starter workflows are fine.
Tasks
For all workflows, the workflow:
.yml
file with the language or platform as its filename, in lower, kebab-cased format (for example,docker-image.yml
). Special characters should be removed or replaced with words as appropriate (for example, "dotnet" instead of ".NET").GITHUB_TOKEN
so that the workflow runs successfully.For CI workflows, the workflow:
ci
directory.ci/properties/*.properties.json
file (for example,ci/properties/docker-publish.properties.json
).push
tobranches: [ $default-branch ]
andpull_request
tobranches: [ $default-branch ]
.release
withtypes: [ created ]
.docker-publish.yml
).For Code Scanning workflows, the workflow:
code-scanning
directory.code-scanning/properties/*.properties.json
file (for example,code-scanning/properties/codeql.properties.json
), with properties set as follows:name
: Name of the Code Scanning integration.organization
: Name of the organization producing the Code Scanning integration.description
: Short description of the Code Scanning integration.categories
: Array of languages supported by the Code Scanning integration.iconName
: Name of the SVG logo representing the Code Scanning integration. This SVG logo must be present in theicons
directory.push
tobranches: [ $default-branch, $protected-branches ]
andpull_request
tobranches: [ $default-branch ]
. We also recommend aschedule
trigger ofcron: $cron-weekly
(for example,codeql.yml
).Some general notes:
actions
organization, orThis workflow uses step-security/harden-runner GitHub Action to restrict outbound traffic to allowed endpoints. Observing network connectivity during the test stage of the CI pipeline can help detect potentially compromised upstream dependencies.
This workflow is specific to npm. I can create separate ones for other package managers and their respective registries. Please let me know.
@josepalafox