Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Semgrep

Semgrep #903

Workflow file for this run

# Name of this GitHub Actions workflow.
name:Semgrep
on:
# Scan changed files in PRs (diff-aware scanning):
# The branches below must be a subset of the branches above
pull_request:
branches:["master", "main"]
push:
branches:["master", "main"]
schedule:
-cron:'0 6 * * *'
permissions:
contents:read
jobs:
semgrep:
# User definable name of this GitHub Actions job.
permissions:
contents:read# for actions/checkout to fetch code
security-events:write# for github/codeql-action/upload-sarif to upload SARIF results
name:semgrep/ci
# If you are self-hosting, change the following `runs-on` value:
runs-on:ubuntu-latest
container:
# A Docker image with Semgrep installed. Do not change this.
image:returntocorp/semgrep
# Skip any PR created by dependabot to avoid permission issues:
if:(github.actor != 'dependabot[bot]')
steps:
# Fetch project source with GitHub Actions Checkout.
-uses:actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9# v3.5.3
# Run the "semgrep ci" command on the command line of the docker image.
-run:semgrep ci --sarif --output=semgrep.sarif
env:
# Add the rules that Semgrep uses by setting the SEMGREP_RULES environment variable.
SEMGREP_RULES:p/default# more at semgrep.dev/explore
-name:Upload SARIF file for GitHub Advanced Security Dashboard
uses:github/codeql-action/upload-sarif@6c089f53dd51dc3fc7e599c3cb5356453a52ca9e# v2.20.0
with:
sarif_file:semgrep.sarif
if:always()

[8]ページ先頭

©2009-2025 Movatter.jp