Skip to content

Commit 12e705f

Browse files
committed
ci: added govulscan security scanner tool
Signed-off-by: Frédéric BIDON <fredbi@yahoo.com>
1 parent adc6681 commit 12e705f

File tree

1 file changed

+23
-2
lines changed

1 file changed

+23
-2
lines changed

.github/workflows/scanner.yml

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,11 @@ permissions: read-all
66
# A fast vulnerability scan on the repo that effectively supplements ossf scorecard and codesql
77
# and may run every day.
88
#
9-
# Trivy reports are often more easily actionable than codeql reports.
9+
# * trivy reports are often more easily actionable than codeql reports.
10+
# * govumnscan supplements this analysis with a more go-specific approach
1011
#
11-
# TODO(fredbi): we may supplement this analysis with snyk (to be experimented with) (requires a token).
12+
# NOTE: at this moment, we don't want to adopt snyk, which requires a token, provides an extra dashboard etc.
13+
# Most likely, snyk would be redundant with trivy.
1214

1315
on:
1416
branch_protection_rule:
@@ -45,3 +47,22 @@ jobs:
4547
with:
4648
category: trivy
4749
sarif_file: trivy-code-report.sarif
50+
51+
govulnscan:
52+
name: go vulnerability scan
53+
runs-on: ubuntu-latest
54+
permissions:
55+
contents: read
56+
security-events: write
57+
steps:
58+
-
59+
id: govulncheck
60+
uses: golang/govulncheck-action@b625fbe08f3bccbe446d94fbf87fcc875a4f50ee # v1.0.4
61+
output-format: sarif
62+
output-file: govulnscan-report.sarif
63+
-
64+
name: Upload govulnscan findings to code scanning dashboard
65+
uses: github/codeql-action/upload-sarif@014f16e7ab1402f30e7c3329d33797e7948572db # v4.31.3
66+
with:
67+
category: govulnscan
68+
sarif_file: govulnscan-code-report.sarif

0 commit comments

Comments
 (0)