fix(ci): pin dependency-audit reusable workflow to SHA#104
fix(ci): pin dependency-audit reusable workflow to SHA#104
Conversation
Pin petry-projects/.github reusable workflow to commit SHA 208ec2d69b75227d375edf8745d84fbac05a76b2 (v1) to comply with the org action-pinning policy. Closes #89 Co-authored-by: don-petry <don-petry@users.noreply.github.com>
|
Warning Rate limit exceeded
Your organization is not enrolled in usage-based pricing. Contact your admin to enable usage-based pricing to continue reviews beyond the rate limit, or try again in 51 minutes and 37 seconds. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Path: .coderabbit.yaml Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (1)
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Pull request overview
This PR updates the repository’s dependency audit GitHub Actions workflow to comply with the org “pin reusable workflows to a SHA” policy by replacing a mutable @v1 reference with an immutable commit SHA.
Changes:
- Pin
petry-projects/.github/.github/workflows/dependency-audit-reusable.ymlfrom@v1to commit208ec2d69b75227d375edf8745d84fbac05a76b2(annotated as# v1).
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
|
CI is green. @don-petry — please review and merge when ready. |
Automated review — APPROVEDRisk: MEDIUM SummaryThis PR pins a reusable workflow call from a mutable @v1 tag to an immutable SHA, which is a security improvement that addresses org compliance issue #89. All CI checks pass (CodeQL, SonarCloud, AgentShield). One minor correctness note: the pinned SHA (208ec2d69b75227d375edf8745d84fbac05a76b2) is the annotated tag object SHA, not the underlying commit SHA (ae9709f4466dec60a5733c9e7487f69dcd004e05); however, GitHub Actions resolves this correctly as evidenced by passing CI, and the immutability guarantee of SHA pinning is preserved either way. FindingsMinor
Info
CI statusAll status checks pass: CodeQL (actions + python), SonarCloud (0 new issues, 0 security hotspots), AgentShield, Claude Code. Note: GitHub prevents self-approval of PRs. Review verdict is APPROVED but a second reviewer must formally approve via GitHub. Reviewed by the don-petry PR-review cascade (triage: haiku 4.5 → deep: sonnet 4.6 + duck: gpt-5.4 → audit: opus 4.6). Reply with |



Summary
petry-projects/.github/.github/workflows/dependency-audit-reusable.ymlfrom@v1to SHA208ec2d69b75227d375edf8745d84fbac05a76b2(which is thev1tag) to comply with the org action-pinning policy.Motivation
Weekly compliance audit flagged
dependency-audit.ymlfor using an unpinned action reference (@v1tag). Tags are mutable and can be moved; pinning to a SHA ensures the workflow always runs the exact same code.Closes #89
Generated with Claude Code