From 03e876754d369b1d79042ebe90a25eb5ed5ed9b0 Mon Sep 17 00:00:00 2001 From: Matthieu MOREL Date: Mon, 21 Jun 2021 10:49:57 +0200 Subject: [PATCH] Add security scan (#654) * Add security scan * Update scan.yml --- .github/workflows/scan.yml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 .github/workflows/scan.yml diff --git a/.github/workflows/scan.yml b/.github/workflows/scan.yml new file mode 100644 index 0000000..f2a960a --- /dev/null +++ b/.github/workflows/scan.yml @@ -0,0 +1,26 @@ +name: "Security Scan" + +# Run workflow each time code is pushed to your repository and on a schedule. +# The scheduled workflow runs every at 00:00 on Sunday UTC time. +on: + push: + pull_request: + schedule: + - cron: '0 0 * * 0' + +jobs: + build: + runs-on: ubuntu-latest + steps: + - name: Check out code into the Go module directory + uses: actions/checkout@v1 + - name: Security Scan + uses: securego/gosec@master + with: + # we let the report trigger content trigger a failure using the GitHub Security features. + args: '-no-fail -fmt sarif -out results.sarif ./...' + - name: Upload SARIF file + uses: github/codeql-action/upload-sarif@v1 + with: + # Path to SARIF file relative to the root of the repository + sarif_file: results.sarif