diff --git a/.github/workflows/codacy.yml b/.github/workflows/codacy.yml
deleted file mode 100644
index 84afee0..0000000
--- a/.github/workflows/codacy.yml
+++ /dev/null
@@ -1,49 +0,0 @@
-# This workflow uses actions not certified by GitHub. They are provided by a
-# third-party and governed by separate terms of service, privacy policy, and
-# support documentation. This workflow checks out code, performs a Codacy
-# security scan, and integrates the results with GitHub Advanced Security code
-# scanning feature. For more info on the Codacy Security Scan action usage and
-# parameters, see: https://github.com/codacy/codacy-analysis-cli-action.
-# For more info on Codacy Analysis CLI in general, see:
-# https://github.com/codacy/codacy-analysis-cli.
-
-name: Codacy Security Scan
-
-on:
- push:
- branches: [ "master" ]
- pull_request:
- branches: [ "master" ]
- schedule:
- - cron: '0 21 * * 5' # Runs at 21:00, only on Friday
-
-jobs:
- codacy-security-scan:
- permissions:
- actions: read
- contents: read
- security-events: write
- name: Codacy Security Scan
- runs-on: ubuntu-latest
- steps:
- - name: Checkout code
- uses: actions/checkout@main
-
- - name: Run Codacy Analysis CLI
- uses: codacy/codacy-analysis-cli-action@master
- with:
- project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
- verbose: true
- output: results.sarif
- format: sarif
- # Adjust severity of non-security issues
- gh-code-scanning-compat: true
- # Force 0 exit code to allow SARIF file generation
- # This will hand over control about PR rejection to the GitHub side
- max-allowed-issues: 2147483647
-
- # Upload the SARIF file generated in the previous step
- - name: Upload SARIF results file
- uses: github/codeql-action/upload-sarif@main
- with:
- sarif_file: results.sarif
diff --git a/assets/images/Structure.svg b/assets/images/Structure.svg
index 5d60969..4969bec 100644
--- a/assets/images/Structure.svg
+++ b/assets/images/Structure.svg
@@ -1 +1 @@
-
\ No newline at end of file
+
\ No newline at end of file