Skip to content

Semgrep Security Scan #1862

Semgrep Security Scan

Semgrep Security Scan #1862

Workflow file for this run

name: Semgrep Security Scan
on:
pull_request:
branches: [ main ]
push:
branches: [ main ]
schedule:
- cron: '0 1 * * *'
jobs:
semgrep:
name: Scan
runs-on: ubuntu-latest
permissions:
contents: read
checks: write
container:
image: semgrep/semgrep@sha256:1844697a3d8b80166e2eaadb93f189a9372e6c8dc025cb14d9400f06e7475261 #v1.116.0
# Skip any PR created by dependabot to avoid permission issues:
if: (github.actor != 'dependabot[bot]')
steps:
# Fetch project source with GitHub Actions Checkout.
- uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3 #v6.0.0
# Run the "semgrep ci" command on the command line of the docker image.
- run: semgrep ci --exclude "gen/*"
env:
# Add the rules that Semgrep uses by setting the SEMGREP_RULES environment variable - more at semgrep.dev/explore.
SEMGREP_RULES: p/default p/golang p/github-actions p/docker