diff --git a/.github/workflows/ci_cd.yml b/.github/workflows/ci_cd.yml index 29c0487f..49493beb 100644 --- a/.github/workflows/ci_cd.yml +++ b/.github/workflows/ci_cd.yml @@ -32,6 +32,17 @@ jobs: bot-user: ${{ secrets.PYANSYS_CI_BOT_USERNAME }} bot-email: ${{ secrets.PYANSYS_CI_BOT_EMAIL }} + check-vulnerabilities: + name: "Check library vulnerabilities" + runs-on: ubuntu-latest + steps: + - uses: ansys/actions/check-vulnerabilities@v10.0 + with: + python-version: ${{ env.MAIN_PYTHON_VERSION }} + token: ${{ secrets.PYANSYS_CI_BOT_TOKEN }} + python-package-name: ${{ env.LIBRARY_NAME }} + dev-mode: ${{ github.ref != 'refs/heads/main' }} + style: name: Code style runs-on: ubuntu-latest diff --git a/SECURITY.md b/SECURITY.md new file mode 100644 index 00000000..5a88c014 --- /dev/null +++ b/SECURITY.md @@ -0,0 +1,16 @@ +# Security Policy + +## Reporting a vulnerability + +> [!CAUTION] +> Do not use GitHub issues to report any security vulnerabilities. + +If you detect a vulnerability, contact the [PyAnsys Core team](mailto:pyansys.core@ansys.com), +mentioning the repository and the details of your finding. The team will address it as soon as possible. + +Provide the PyAnsys Core team with this information: + +- Any specific configuration settings needed to reproduce the problem +- Step-by-step guidance to reproduce the problem +- The exact location of the problematic source code, including tag, branch, commit, or a direct URL +- The potential consequences of the vulnerability, along with a description of how an attacker could take advantage of the issue diff --git a/doc/changelog.d/324.maintenance.md b/doc/changelog.d/324.maintenance.md new file mode 100644 index 00000000..059b87de --- /dev/null +++ b/doc/changelog.d/324.maintenance.md @@ -0,0 +1 @@ +Add `ansys/actions/check-vulnerabilities` action and `security.md` file \ No newline at end of file