Skip to content

Adding poutine SAST #2138

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 9 commits into
base: main
Choose a base branch
from
Open

Conversation

h2parson
Copy link

@h2parson h2parson commented May 9, 2025

This PR adds poutine to CI for static application security testing

This PR addresses issue #1866

When this feature was pushed it was observed that poutine ran as part of the CI routine which shows that the feature works

This PR does NOT change input/output behaviour of a cryptographic algorithm and does not change the list of algorithms available

@h2parson h2parson requested a review from SWilson4 as a code owner May 9, 2025 18:41
@praveksharma praveksharma self-requested a review May 9, 2025 18:48
@h2parson h2parson changed the title initial commit Adding poutine SAST May 9, 2025
Signed-off-by: Hayden Parsons <[email protected]>
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

- name: Configure as safe directory
run: git config --global --add safe.directory /__w/liboqs/liboqs
- name: poutine - Static Application Security Testing
uses: boostsecurityio/poutine-action@main

Check warning

Code scanning / Scorecard

Pinned-Dependencies Medium

score is 9: third-party GitHubAction not pinned by hash
Click Remediation section below to solve this issue
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

See Pravek's comment above for details on how to fix this message.

gave Poutine Write Permissions
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants