Skip to content

gosec

gosec #159

Workflow file for this run

name: gosec
on:
push:
schedule:
- cron: "0 0 * * *"
workflow_dispatch:
jobs:
tests:
runs-on: ubuntu-latest
permissions:
security-events: write
actions: read
contents: read
env:
GO111MODULE: on
steps:
- name: Checkout Source
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
- name: Run Gosec Security Scanner
uses: securego/gosec@cf4ab3ea7cf2856f794c1de8cb7e03d4196086c5 # master
with:
# we let the report trigger content trigger a failure using the GitHub Security features.
args: "-no-fail -fmt sarif -out results.sarif ./..."
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@e8893c57a1f3a2b659b6b55564fdfdbbd2982911 # v3.24.0
with:
# Path to SARIF file relative to the root of the repository
sarif_file: results.sarif