Skip to content

chore(deps): bump the actions-deps group across 1 directory with 16 updates #346

chore(deps): bump the actions-deps group across 1 directory with 16 updates

chore(deps): bump the actions-deps group across 1 directory with 16 updates #346

Workflow file for this run

---
name: Semgrep
on:
# Scan changed files in PRs (diff-aware scanning):
pull_request_target: {}
# Scan on-demand through GitHub Actions interface:
workflow_dispatch: {}
# Scan mainline branches and report all findings:
push:
branches: [main]
# Schedule the CI job (this method uses cron syntax):
schedule:
- cron: 15 11 * * * # Sets Semgrep to scan every day at 11:15 UTC.
permissions:
contents: read
jobs:
semgrep:
name: semgrep/ci
runs-on: ubuntu-latest
permissions:
security-events: write
# contents: read
# actions: read
container:
image: semgrep/semgrep@sha256:85f9de554201cc891c470774bb93a7f4faf41ea198ddccc34a855b53f7a51443 # v1.127.1
# Skip any PR created by dependabot to avoid permission issues:
if: (github.actor != 'dependabot[bot]')
steps:
- name: Harden Runner
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
with:
egress-policy: audit
- name: Checkout code
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v4.5.4
# Run the "semgrep ci" command on the command line of the docker image.
- run: semgrep ci --sarif --sarif-output=semgrep.sarif
env:
# Connect to Semgrep AppSec Platform through your SEMGREP_APP_TOKEN.
SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }}
# Do not check for new version
SEMGREP_ENABLE_VERSION_CHECK: 0
# No metrics
SEMGREP_SEND_METRICS: 'off'
- name: Upload SARIF file for GitHub Advanced Security Dashboard
uses: github/codeql-action/upload-sarif@0499de31b99561a6d14a36a5f662c2a54f91beee # v4.31.2
with:
sarif_file: semgrep.sarif