generated from jauderho/ghafiles
-
Notifications
You must be signed in to change notification settings - Fork 0
45 lines (39 loc) · 999 Bytes
/
semgrep.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
name: Semgrep
on:
pull_request: {}
push:
branches:
- main
- master
paths:
- .github/workflows/semgrep.yml
schedule:
- cron: '0 0 * * 0'
workflow_call:
permissions: read-all
jobs:
semgrep:
name: Scan
runs-on: ubuntu-24.04
permissions:
# Needed to upload the results to code-scanning dashboard.
security-events: write
actions: read
contents: read
container:
image: returntocorp/semgrep
if: (github.actor != 'dependabot[bot]')
steps:
- name: Harden Runner
uses: step-security/harden-runner@91182cccc01eb5e619899d80e4e971d6181294a7 # v1
with:
egress-policy: audit
disable-telemetry: false
allowed-endpoints:
github.com:443
semgrep.dev:443
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683
# Run Semgrep as CI
- run: semgrep ci
env:
SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }}