dependabot[bot]
|
0adc027e25
|
build(deps): bump github/codeql-action from 1 to 2
Bumps [github/codeql-action](https://github.com/github/codeql-action) from 1 to 2.
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](https://github.com/github/codeql-action/compare/v1...v2)
---
updated-dependencies:
- dependency-name: github/codeql-action
dependency-type: direct:production
update-type: version-update:semver-major
...
Signed-off-by: dependabot[bot] <support@github.com>
|
2022-05-02 21:30:46 -04:00 |
naveen
|
2929a3c0bd
|
chore: Set permissions for GitHub actions
Restrict the GitHub token permissions only to the required ones; this way, even if the attackers will succeed in compromising your workflow, they won’t be able to do much.
- Included permissions for the action. https://github.com/ossf/scorecard/blob/main/docs/checks.md#token-permissions
https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
https://docs.github.com/en/actions/using-jobs/assigning-permissions-to-jobs
[Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/)
Signed-off-by: naveen <172697+naveensrinivasan@users.noreply.github.com>
|
2022-05-02 20:48:01 -04:00 |
Richard Hansen
|
a6b969c811
|
ci: Bump actions/checkout to v3
|
2022-03-01 17:17:16 -05:00 |
Richard Hansen
|
43aa1e4aeb
|
ci: Reformat `.yml` files for readability
|
2022-01-28 01:39:45 -05:00 |
John McLear
|
e6949cd974
|
Create codeql-analysis.yml
|
2020-08-24 17:57:30 +01:00 |