Skip to content

Conversation

@niStee
Copy link

@niStee niStee commented Dec 26, 2025

  • Add OSV-Scanner workflow running on PRs to main and weekly (Wed 11:17 UTC).
  • Uses the pinned reusable workflow google/osv-scanner-action@1f12429 (v1.7.1) with args -r --skip-git ./.
  • Minimal permissions: contents: read, security-events: write; secrets: inherit.
  • Non-blocking by policy: leave this check non-required if you don’t want it to gate merges.

Testing/impact: Workflow-only change; no runtime code touched.

@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.


permissions:
contents: read
security-events: write

Check failure

Code scanning / Scorecard

Token-Permissions

score is 0: topLevel 'security-events' permission set to 'write' Remediation tip: Visit [https://app.stepsecurity.io/secureworkflow](https://app.stepsecurity.io/secureworkflow/file://./osv-scanner.yml/unknown?enable=permissions). Tick the 'Restrict permissions for GITHUB_TOKEN' Untick other options NOTE: If you want to resolve multiple issues at once, you can visit [https://app.stepsecurity.io/securerepo](https://app.stepsecurity.io/securerepo) instead. Click Remediation section below for further remediation help
./
permissions:
contents: read
security-events: write

Check failure

Code scanning / Scorecard

Token-Permissions

score is 0: jobLevel 'security-events' permission set to 'write' Remediation tip: Visit [https://app.stepsecurity.io/secureworkflow](https://app.stepsecurity.io/secureworkflow/file://./osv-scanner.yml/unknown?enable=permissions). Tick the 'Restrict permissions for GITHUB_TOKEN' Untick other options NOTE: If you want to resolve multiple issues at once, you can visit [https://app.stepsecurity.io/securerepo](https://app.stepsecurity.io/securerepo) instead. Click Remediation section below for further remediation help
security-events: write
id-token: write
steps:
- name: Checkout repository

Check warning

Code scanning / Scorecard

Pinned-Dependencies

score is 0: GitHub-owned GitHubAction not pinned by hash Click Remediation section below to solve this issue
with:
persist-credentials: false

- name: Run OSSF Scorecard

Check warning

Code scanning / Scorecard

Pinned-Dependencies

score is 0: third-party GitHubAction not pinned by hash Click Remediation section below to solve this issue
results_format: sarif
publish_results: true

- name: Upload SARIF to code scanning

Check warning

Code scanning / Scorecard

Pinned-Dependencies

score is 0: GitHub-owned GitHubAction not pinned by hash Click Remediation section below to solve this issue
with:
sarif_file: scorecard-results.sarif

- name: Upload Scorecard results artifact

Check warning

Code scanning / Scorecard

Pinned-Dependencies

score is 0: GitHub-owned GitHubAction not pinned by hash Click Remediation section below to solve this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant