-
Notifications
You must be signed in to change notification settings - Fork 23
feat: add frontend security vulnerability scanning #1029
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
b1c0a14 to
06afd3c
Compare
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
7926cb2 to
882cc5f
Compare
🔒 Go Security Scan ResultsStatus: ✅ Passed Total Vulnerabilities: 0 Module Results
✅ Safe to merge - No high/critical vulnerabilities detected Scan Details: View full results |
882cc5f to
6db206e
Compare
carddev81
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Need some git file and commit history cleanup.
.github/workflows/eslint.yml
Outdated
| yarn && \ | ||
| yarn lint-staged && \ | ||
| yarn build | ||
| yarn build No newline at end of file |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@corypride Can you remove this commit from the history since nothing changed here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be removed from the commit history too, this file has been changed already to the appropriate values
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be removed from the commit history too, this file has been changed already to the appropriate values
node_modules/.yarn-integrity
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the node modules needs to be removed from this commit. You should be able to rebase and force push this out of here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be removed from the commit history too, this file has been changed already to the appropriate values
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be removed from the commit history too, this file has been changed already to the appropriate values
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be removed from the commit history too, this file has been changed already to the appropriate values
yarn.lock
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This file can be deleted, there isn't anything in it?
6db206e to
275a9fa
Compare
404ac9c to
05c18cc
Compare
05c18cc to
93432c8
Compare
carddev81
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. I left a comment in there for you.
| --max-time 10 \ | ||
| --silent \ | ||
| --fail \ | ||
| --data "{\"channel\":\"#unlockedv2-chat\",\"username\":\"Security Bot\",\"icon_emoji\":\":warning:\",\"text\":\"$SLACK_MESSAGE\"}" \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
change unlockedv2-chat to 'unlockedv2-alerts', i moved the notifications to go here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you just change it and push right now and then I will also approve so we can get this through?
feat: add frontend security vulnerability scanning
Description of Change
Added comprehensive frontend dependency security scanning to prevent vulnerable packages from being merged into the codebase. Implemented a dedicated GitHub Actions workflow that scans for high and critical severity vulnerabilities and blocks PR merges when security issues are detected.
Implementation Details
.github/workflows/security-frontend.ymlworkflowSecurity Vulnerabilities Fixed
Current Security Status
Workflow Features
Security Gate Behavior
Testing
Testing Instructions for Reviewers
Local Testing
GitHub Actions Workflow Testing
Automated Testing
Manual Testing
Security Gate Verification
Impact on Development Workflow
Configuration Options
--level=high(blocks high+ vulnerabilities)--level=critical: Most permissive (blocks critical only)--level=moderate: Stricter (blocks moderate+).github/workflows/security-frontend.ymlFiles Changed
.github/workflows/security-frontend.yml(new dedicated security workflow)frontend/package.json(updated vulnerable dependencies)frontend/yarn.lock(regenerated with secure versions).claude/context/pr_desc.md(updated this file)Additional Context
This implementation addresses a critical security gap by ensuring frontend dependencies are continuously validated against the latest vulnerability database. The system now prevents vulnerable packages from being merged into the codebase and provides real-time notifications when security issues are detected.
The workflow is currently passing with 0 vulnerabilities, demonstrating that all security issues have been resolved and the system is working correctly.