Skip to content

Conversation

@carddev81
Copy link
Contributor

@carddev81 carddev81 commented Oct 21, 2025

Description of the change

Added automated Go vulnerability scanning to the CI/CD pipeline using the official govulncheck tool. This workflow runs on every pull request that modifies Go code or dependencies and blocks merges if vulnerabilities are detected. Currently there was only one library that needed to be updated along with upping the golang version to 1.23. Not bad.

This enhancement closes a major gap in our Dev Security Ops workflow by ensuring Go dependencies are continuously validated against the latest CVE data from the Go vulnerability database.

Implementation

  • Added .github/workflows/security-go.yml for automated vulnerability scanning.
  • Triggered for pull requests modifying Go files or go.mod.
  • Workflow fails when high or critical vulnerabilities are detected.
  • Integrates with GitHub Security alerts for team notifications.
  • Verified on test PRs with known vulnerable dependencies.
  • Add Slack notification webhook to point to unlockedv2-chat (should it go to a different channel, I figured this was a good one since we all read it and this tool shouldn't spam us??)

Screenshot(s)

NA - only ci/cd changes

Additional context

Testing requires only navigating around the site making sure the program tracking pages load properly due to library update.

@carddev81 carddev81 requested a review from a team as a code owner October 21, 2025 03:21
@carddev81 carddev81 requested review from CK-7vn and removed request for a team October 21, 2025 03:21
@calisio calisio requested review from calisio and corypride and removed request for CK-7vn October 22, 2025 17:48
Copy link
Contributor

@calisio calisio left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It seems like the one library that was updated was the crypto library, which after looking is only really used for provider platforms. Hard to check if that had any impact on how they work right now since we haven't used that feature in months/isn't super relevant right now, but something to be aware of if we pick it back up again.
Looks good and functions as expected right now though!

Copy link
Contributor

@corypride corypride left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tests good! Solid implementation, curious about how it will fail currently, I think that it may be too strict as it is currently implemented, and wondering if it would be better if we failed on critical/high vulnerabilities only?

corypride added a commit that referenced this pull request Oct 27, 2025
- Create dedicated security-frontend.yml workflow for frontend dependency scanning
- Scan for critical and high vulnerabilities only
- Send Slack notifications when vulnerabilities are detected
- Never block builds, only notify via webhook
- Update ESLint workflow to remove duplicate security scanning
- Follow gosec implementation pattern from PR #1026
@carddev81 carddev81 merged commit 410c36a into main Oct 30, 2025
9 checks passed
@carddev81 carddev81 deleted the carddev81/cicd_go_vunerabilities branch October 30, 2025 13:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants