Delete semgrep-scan.yml

This commit is contained in:
silas 2022-01-09 12:43:34 +00:00 committed by GitHub
parent e24b249110
commit c0d7810ad3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 0 additions and 56 deletions

View File

@ -1,56 +0,0 @@
# Flexible static application security testing based on various rulesets depending on
# various parameters such as language, dockerfile, etc.
name: Semgrep Scanner
# Controls when the workflow will run
on:
# Triggers the workflow on push or pull request events subject to branch selected
push:
branches:
- main
pull_request:
branches:
- main
jobs:
semgrep:
name: Semgrep Scan
runs-on: ubuntu-latest
# Set permissions to allow writing security events
permissions:
security-events: write
# Skip any PR created by dependabot to avoid permission issues
if: (github.actor != 'dependabot[bot]')
steps:
# Fetch project source
- uses: actions/checkout@v2
- uses: returntocorp/semgrep-action@v1
with:
config: >- # more at semgrep.dev/explore
p/secrets
p/eslint-plugin-security
# Instead of `config:`, use rules set in Semgrep App.
# Get your token from semgrep.dev/manage/settings.
# publishToken: ${{ secrets.SEMGREP_APP_TOKEN }}
# Never fail the build due to findings on pushes.
# Instead, just collect findings for semgrep.dev/manage/findings
# auditOn: push
# Upload findings to GitHub Advanced Security Dashboard [step 1/2]
generateSarif: "1"
# Change job timeout (default is 1800 seconds; set to 0 to disable)
# env:
# SEMGREP_TIMEOUT: 300
# Upload findings to GitHub Advanced Security Dashboard [step 2/2]
- name: Upload SARIF file for GitHub Advanced Security Dashboard
uses: github/codeql-action/upload-sarif@v1
if: always()
with:
sarif_file: semgrep.sarif