Skip to content

FEAT:Create devskim.yml #87

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open

FEAT:Create devskim.yml #87

wants to merge 1 commit into from

Conversation

sumitmsft
Copy link
Contributor

@sumitmsft sumitmsft commented Jun 19, 2025

Summary

This pull request introduces a new GitHub Actions workflow to integrate the DevSkim static analysis tool into the CI/CD pipeline. The workflow is designed to scan code for security issues and upload the results to the GitHub Security tab.

New Workflow Integration:

  • .github/workflows/devskim.yml: Added a new workflow named "DevSkim" that runs on push and pull_request events for the main branch, as well as on a weekly schedule. It uses the microsoft/DevSkim-Action to perform security scans and uploads the results in SARIF format using the github/codeql-action/upload-sarif action.

Issue Reference

Fixes: AB#37674

@Copilot Copilot AI review requested due to automatic review settings June 19, 2025 09:40
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

Copy link
Contributor

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

Adds a new DevSkim GitHub Actions workflow to run security scans on code pushes, pull requests, and a weekly schedule, then uploads results to the Security tab.

  • Introduces .github/workflows/devskim.yml to invoke microsoft/DevSkim-Action and github/codeql-action/upload-sarif
  • Triggers on push, pull_request to main, and weekly via cron
Comments suppressed due to low confidence (3)

.github/workflows/devskim.yml:17

  • [nitpick] The job ID 'lint' is generic and may not clearly reflect that it's running DevSkim scans; consider renaming it to 'devskim' or similar for clarity.
  lint:

.github/workflows/devskim.yml:31

  • Ensure the 'devskim-results.sarif' file exists at the expected path; consider configuring the DevSkim action with an explicit output path or adding a verification step before uploading.
      - name: Upload DevSkim scan results to GitHub Security tab

.github/workflows/devskim.yml:14

  • The cron schedule runs only on Fridays at 07:44 UTC; if a different frequency is intended, adjust the cron expression or add a comment clarifying the schedule.
    - cron: '44 7 * * 5'

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants