1- name : Security
1+ name : Security scan
22
33on :
44 push :
99 - cron : ' 0 3 * * 1'
1010 workflow_dispatch : # Allow manual trigger
1111
12+ permissions :
13+ contents : read
14+ # required for codeql analysis
15+ security-events : write
16+
1217jobs :
13- analyze :
14- name : analyze
18+ govulncheck :
19+ name : govulncheck
1520 runs-on : ubuntu-latest
1621 strategy :
1722 fail-fast : false
18-
19- permissions :
20- contents : read
21- # required for codeql analysis
22- security-events : write
23-
2423 steps :
2524 - uses : actions/checkout@v6
2625 - uses : actions/setup-go@v6
27- with :
28- go-version : ' stable'
2926
3027 - name : govulncheck
3128 run : govulncheck ./...
3229
30+ bearer :
31+ name : bearer
32+ runs-on : ubuntu-latest
33+ strategy :
34+ fail-fast : false
35+ steps :
36+ - uses : actions/checkout@v6
3337 - name : Bearer
3438 uses : bearer/bearer-action@v2
3539 with :
3640 skip-path : ' docs/'
3741
42+ codeql :
43+ name : codeql
44+ runs-on : ubuntu-latest
45+ strategy :
46+ fail-fast : false
47+ steps :
48+ - uses : actions/checkout@v6
49+ - uses : actions/setup-go@v6
50+
3851 - name : Initialize CodeQL
3952 uses : github/codeql-action/init@v4
4053 with :
4154 languages : go
55+
4256 - name : Autobuild
4357 uses : github/codeql-action/autobuild@v4
4458 - name : Perform CodeQL Analysis
4559 uses : github/codeql-action/analyze@v4
4660
61+ trivy-codeql :
62+ name : trivy-codeql
63+ runs-on : ubuntu-latest
64+ strategy :
65+ fail-fast : false
66+ steps :
67+ - uses : actions/checkout@v6
68+ - uses : actions/setup-go@v6
69+
4770 - name : Run Trivy vulnerability scanner (source code)
4871 uses : aquasecurity/trivy-action@0.35.0
4972 with :
6184 with :
6285 sarif_file : " trivy-results.sarif"
6386
87+ trivy-logs :
88+ name : trivy-logs
89+ runs-on : ubuntu-latest
90+ strategy :
91+ fail-fast : false
92+ steps :
93+ - uses : actions/checkout@v6
94+ - uses : actions/setup-go@v6
95+
6496 - name : Run Trivy scanner (table output for logs)
6597 uses : aquasecurity/trivy-action@0.35.0
6698 if : always()
@@ -71,4 +103,14 @@ jobs:
71103 format : " table"
72104 severity : " CRITICAL,HIGH,MEDIUM"
73105 ignore-unfixed : true
74- exit-code : " 1"
106+ exit-code : " 1"
107+
108+ - name : Run Trivy scanner (license)
109+ uses : aquasecurity/trivy-action@0.35.0
110+ if : always()
111+ with :
112+ scan-type : fs
113+ scan-ref : .
114+ scanners : license
115+ severity : UNKNOWN,HIGH,CRITICAL
116+ format : table
0 commit comments