* Fix artifact upload paths for CodeQL and SBOM results - Correct CodeQL SARIF path from **/results to ../results (relative to workspace) - Add fallback path for SBOM to handle different generation locations - This should resolve the 'No files were found' warnings for artifacts * Test commit to trigger Security Analysis workflow with fixed artifact paths * Update docker.yaml * Update security.yaml * Update security.yaml
122 lines
2.8 KiB
YAML
122 lines
2.8 KiB
YAML
name: Security Analysis
|
|
|
|
on:
|
|
push:
|
|
branches: [main, stable]
|
|
pull_request:
|
|
branches: [main]
|
|
schedule:
|
|
# Run weekly security scan on Sundays at 2 AM
|
|
- cron: '0 2 * * 0'
|
|
|
|
permissions:
|
|
actions: read
|
|
contents: read
|
|
security-events: read
|
|
|
|
jobs:
|
|
codeql:
|
|
name: CodeQL Analysis
|
|
runs-on: ubuntu-latest
|
|
timeout-minutes: 45
|
|
|
|
strategy:
|
|
fail-fast: false
|
|
matrix:
|
|
language: ['javascript', 'typescript']
|
|
|
|
steps:
|
|
- name: Checkout repository
|
|
uses: actions/checkout@v4
|
|
|
|
- name: Initialize CodeQL
|
|
uses: github/codeql-action/init@v3
|
|
with:
|
|
languages: ${{ matrix.language }}
|
|
queries: security-extended,security-and-quality
|
|
|
|
- name: Autobuild
|
|
uses: github/codeql-action/autobuild@v3
|
|
|
|
- name: Perform CodeQL Analysis
|
|
uses: github/codeql-action/analyze@v3
|
|
with:
|
|
category: "/language:${{matrix.language}}"
|
|
upload: false
|
|
output: "codeql-results"
|
|
|
|
- name: Upload CodeQL results as artifact
|
|
uses: actions/upload-artifact@v4
|
|
if: always()
|
|
with:
|
|
name: codeql-results-${{ matrix.language }}
|
|
path: codeql-results
|
|
|
|
dependency-scan:
|
|
name: Dependency Vulnerability Scan
|
|
runs-on: ubuntu-latest
|
|
|
|
steps:
|
|
- name: Checkout repository
|
|
uses: actions/checkout@v4
|
|
|
|
- name: Setup Node.js
|
|
uses: actions/setup-node@v4
|
|
with:
|
|
node-version: '20.18.0'
|
|
|
|
- name: Install pnpm
|
|
uses: pnpm/action-setup@v4
|
|
with:
|
|
version: '9.14.4'
|
|
|
|
- name: Install dependencies
|
|
run: pnpm install --frozen-lockfile
|
|
|
|
- name: Run npm audit
|
|
run: pnpm audit --audit-level moderate
|
|
continue-on-error: true
|
|
|
|
- name: Generate SBOM
|
|
uses: anchore/sbom-action@v0
|
|
with:
|
|
path: ./
|
|
format: spdx-json
|
|
artifact-name: sbom.spdx.json
|
|
|
|
- name: Upload SBOM as artifact
|
|
uses: actions/upload-artifact@v4
|
|
if: always()
|
|
with:
|
|
name: sbom-results
|
|
path: |
|
|
sbom.spdx.json
|
|
**/sbom.spdx.json
|
|
|
|
secrets-scan:
|
|
name: Secrets Detection
|
|
runs-on: ubuntu-latest
|
|
|
|
steps:
|
|
- name: Checkout repository
|
|
uses: actions/checkout@v4
|
|
with:
|
|
fetch-depth: 0
|
|
|
|
- name: Run Trivy secrets scan
|
|
uses: aquasecurity/trivy-action@master
|
|
with:
|
|
scan-type: 'fs'
|
|
scan-ref: '.'
|
|
format: 'sarif'
|
|
output: 'trivy-secrets-results.sarif'
|
|
scanners: 'secret'
|
|
|
|
- name: Upload Trivy secrets results as artifact
|
|
uses: actions/upload-artifact@v4
|
|
if: always()
|
|
with:
|
|
name: trivy-secrets-results
|
|
path: trivy-secrets-results.sarif
|
|
|