Skip to content

feat: comprehensive project restructuring and enhancements #1

feat: comprehensive project restructuring and enhancements

feat: comprehensive project restructuring and enhancements #1

Workflow file for this run

name: Security Scan
on:
push:
branches: ["main", "develop"]
pull_request:
branches: ["main", "develop"]
schedule:
# Run security scan daily at 2 AM UTC
- cron: "0 2 * * *"
concurrency:
group: security-${{ github.ref }}
cancel-in-progress: false
env:
GO_VERSION: "1.25.3"
TRIVY_VERSION: "0.33.1"
jobs:
code-security:
name: Code Security Scan
runs-on: ubuntu-latest
timeout-minutes: 10
permissions:
contents: read
security-events: write
steps:
- name: Checkout code
uses: actions/checkout@v5
- name: Set up Go
uses: actions/setup-go@v6
with:
go-version: ${{ env.GO_VERSION }}
cache: true
- name: Run govulncheck
run: |
go install golang.org/x/vuln/cmd/govulncheck@latest
govulncheck ./...
- name: Run Gosec Security Scanner
uses: securego/gosec@v2.22.10
with:
args: "-no-fail -fmt sarif -out gosec.sarif ./..."
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@v4
if: always()
with:
sarif_file: gosec.sarif
container-security:
name: Container Security Scan
runs-on: ubuntu-latest
timeout-minutes: 15
permissions:
contents: read
security-events: write
steps:
- name: Checkout code
uses: actions/checkout@v5
- name: Build Docker image
run: docker build -t helios-operator:latest .
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@0.33.1
with:
image-ref: "helios-operator:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Upload Trivy scan results
uses: github/codeql-action/upload-sarif@v4
if: always()
with:
sarif_file: "trivy-results.sarif"
dependency-scan:
name: Dependency Security Scan
runs-on: ubuntu-latest
timeout-minutes: 10
permissions:
contents: read
security-events: write
steps:
- name: Checkout code
uses: actions/checkout@v5
- name: Set up Go
uses: actions/setup-go@v6
with:
go-version: ${{ env.GO_VERSION }}
cache: true
- name: Run Trivy filesystem scan
uses: aquasecurity/trivy-action@0.33.1
with:
scan-type: "fs"
scan-ref: "."
format: "sarif"
output: "trivy-fs-results.sarif"
- name: Upload filesystem scan results
uses: github/codeql-action/upload-sarif@v4
if: always()
with:
sarif_file: "trivy-fs-results.sarif"