Improve CI security posture: add CodeQL & zizmor workflows, fix dependabot config#725
Conversation
|
You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool. What Enabling Code Scanning Means:
For more information about GitHub Code Scanning, check out the documentation. |
These changes are breaking unless the environment variables are initialized from the action's inputs. |
No. All inputs are also automatically available as |
potiuk
left a comment
There was a problem hiding this comment.
Looks good. But I think we need to look at the matlab things - were it came from.
|
I think they changed release to "pre-release". |
|
@kevinjqliu -> the zizmor issues should be silenced. In this case we do not want to create separate env. |
|
ci is green! |
|
Nice! |

Changes
codeql.yml)zizmor.yml)versionsfield to use list syntax, add license header formatting, addzizmor: ignoreannotation for cooldown ruleverify_dependabot_action.yml: usegithub.event.pull_request.user.logininstead ofgithub.actorto avoid false negatives when non-dependabot users interact with the PRmatlab-actions/run-teststo v3.0.0 (zizmor fix)pelican/action.yml: replace inline${{ inputs.* }}expressions inrun:blocks with environment variables to prevent script injectionstash/restore/action.yml: move${{ inputs.clean }}into anINPUTS_CLEANenv var for the same reasonactions/upload-artifactinstash/save/action.ymlto full SHA (v7)Validated locally