-
-
Notifications
You must be signed in to change notification settings - Fork 551
Add DevSkim security scan workflow #5117
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
|
From your recent PRs it seems you're quite deep into the field of software security. For the less experienced people (that's me), could you outline what it is that you're trying to add, and why it is helpful for us specifically (this goes for all of your PRs, not just this one)? |
|
@CommandMC @arielj – I realize I've generated a lot of noise with PRs and Issues in the last days. My apologies, I got a bit carried away when the new scanners started flagging real vulnerabilities! To clean this up, I'm going to pause all new PRs and Issues immediately. I've logged the specific bugs (Command Injection, XSS) as separate Issues just so they don't get lost, but I won't spam you with more. If you feel the tooling PRs (Renovate/pnpm-audit) are too heavy right now, just let me know and I'll close them. I'm happy to pivot and focus purely on a single PR to fix the critical bugs I found instead. Does that sound like a better way forward? |
|
what are the critical bugs you found? |
|
I do think that it's a good idea to explain what each tool added in these PRs is actually doing, like... what are the kind of security issues that DevSkim would find? what is OSV-Scanner supposed to find? I don't think it's useful to add tools just to add them with no clear reason (at least I don't know what they do) |
|
Good questions, @arielj! I'm happy to wait for @CommandMC to share their thoughts on the general strategy. In the meantime, here's what I found:
I have logged the specific bugs as issues so that we can track them. I'll hold off on the rest until we agree on the plan! |
|
I have to ask, are these comments being generated by an AI? cause it sounds like it |
|
what's the difference between OSV-Scanner (that checks known vulnerabilities) and |
can you link those issues? there are not issues created by you in this repo |
If these are the "bugs" found by CodeQL, I do not want to integrate it here
Please take some time to actually use the launcher before reporting security issues |
Testing/impact: Workflow-only change; no runtime code touched.