Skip to content

Semgrep Security Scan #7276

Semgrep Security Scan

Semgrep Security Scan #7276

Workflow file for this run

name: Semgrep Security Scan
on:
pull_request:
branches: [ main ]
merge_group: # run if triggered as part of a merge queue
push:
branches: [ main ]
schedule:
- cron: '0 1 * * *'
jobs:
semgrep:
name: Scan
runs-on: ubuntu-latest
permissions:
contents: read
checks: write
container:
image: semgrep/semgrep@sha256:1844697a3d8b80166e2eaadb93f189a9372e6c8dc025cb14d9400f06e7475261 #v1.116.0
# Skip any PR created by dependabot to avoid permission issues:
if: (github.actor != 'dependabot[bot]')
steps:
# Fetch project source with GitHub Actions Checkout.
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd #v6.0.2
# Run the "semgrep ci" command on the command line of the docker image.
- run: semgrep ci
env:
# Add the rules that Semgrep uses by setting the SEMGREP_RULES environment variable - more at semgrep.dev/explore.
SEMGREP_RULES: p/default p/golang p/github-actions p/docker