feat: upgrade to Go 1.25.10 and add Trivy & Govulncheck security scans#111
Conversation
| name: Security, Test, Lint & Build | ||
| runs-on: ubuntu-latest | ||
|
|
||
| steps: | ||
| - name: Checkout code | ||
| uses: actions/checkout@v4 | ||
|
|
||
| - name: Set up Go | ||
| uses: actions/setup-go@v5 | ||
| with: | ||
| go-version: '1.25' | ||
| cache: true | ||
| - name: Run tests | ||
| run: make test | ||
|
|
||
| - name: Run golangci-lint | ||
| uses: golangci/golangci-lint-action@v8 | ||
| with: | ||
| version: v2.4.0 | ||
| working-directory: . | ||
|
|
||
| - name: Build for Linux AMD64 | ||
| run: make GOOS=linux GOARCH=amd64 build | ||
|
|
||
| - name: Verify binary | ||
| run: | | ||
| ls -la build/ | ||
| file build/sc-console-agent | ||
| ./build/sc-console-agent -v | ||
| - name: Checkout code | ||
| uses: actions/checkout@v4 | ||
|
|
||
| - name: Set up Go | ||
| uses: actions/setup-go@v5 | ||
| with: | ||
| go-version: '1.25.10' | ||
| cache: true | ||
|
|
||
| - name: Run Trivy Vulnerability Scanner (SCA) | ||
| uses: aquasecurity/trivy-action@0.35.0 | ||
| with: | ||
| scan-type: 'fs' | ||
| scan-ref: '.' | ||
| format: 'table' | ||
| exit-code: '1' | ||
| ignore-unfixed: true | ||
| severity: 'CRITICAL,HIGH' | ||
| skip-dirs: '.envs' | ||
| skip-files: '.env' | ||
|
|
||
| - name: Run Govulncheck | ||
| uses: golang/govulncheck-action@v1.0.4 | ||
| with: | ||
| go-version-input: '1.25.10' | ||
|
|
||
| # 📊 Tests | ||
| - name: Run Tests | ||
| run: make test | ||
|
|
||
| - name: Run golangci-lint | ||
| uses: golangci/golangci-lint-action@v9 | ||
| with: | ||
| working-directory: . | ||
|
|
||
| - name: Build for Linux AMD64 | ||
| run: make GOOS=linux GOARCH=amd64 build | ||
|
|
||
| - name: Verify binary file type & version | ||
| run: | | ||
| ls -la build/ | ||
| file build/sc-console-agent | ||
| ./build/sc-console-agent -v |
Greptile SummaryThis PR upgrades the project to Go 1.25.10 and bolts two new security scanning gates onto the PR validation workflow: a Trivy filesystem SCA scan (blocking on CRITICAL/HIGH unfixed CVEs) and a
Confidence Score: 5/5Safe to merge — changes are additive CI/security tooling with no modifications to application logic. The Go version bump, No files require special attention. Important Files Changed
Prompt To Fix All With AIFix the following 1 code review issue. Work through them one at a time, proposing concise fixes.
---
### Issue 1 of 1
.github/workflows/pr.yml:26-27
The two new security-scanning actions are pinned to mutable version tags (`0.35.0` and `v1.0.4`). Tags can be force-pushed, so a compromised upstream repo could silently replace the tag's target commit and inject malicious code into the workflow without any diff being visible here. Pinning to the immutable SHA digest prevents this. The existing actions in this file follow the same mutable-tag pattern, so updating all of them at once would be the cleanest fix.
```suggestion
- name: Run Trivy Vulnerability Scanner (SCA)
uses: aquasecurity/trivy-action@915ce7f4e1d4e55b17e29e75c47b37d9ff2be2ae # v0.35.0
```
Reviews (2): Last reviewed commit: "feat: upgrade to Go 1.25.10 and integrat..." | Re-trigger Greptile |
c017c63 to
0ce6bf3
Compare
|
@greptile |
… workflows with Trivy and Govulncheck
0ce6bf3 to
5819de5
Compare
…