Bump actions/dependency-review-action from 67d4f4bd7a9b17a0db54d2a7519187c65e339de8 to 07b91577a360213440b7d4bc514338cb37ce61a0 #269
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Dependency Review Action | |
# | |
# This Action will scan dependency manifest files that change as part of a Pull Request, | |
# surfacing known-vulnerable versions of the packages declared or updated in the PR. | |
# Once installed, if the workflow run is marked as required, | |
# PRs introducing known-vulnerable packages will be blocked from merging. | |
# | |
# Source repository: https://github.com/actions/dependency-review-action | |
name: 'Dependency Review' | |
on: [pull_request] | |
permissions: | |
contents: read | |
jobs: | |
dependency-review: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Harden the runner (Audit all outbound calls) | |
uses: step-security/harden-runner@0634a2670c59f64b4a01f0f96f84700a4088b9f0 # v2.12.0 | |
with: | |
egress-policy: audit | |
- name: 'Checkout Repository' | |
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 | |
- name: 'Dependency Review' | |
uses: actions/dependency-review-action@07b91577a360213440b7d4bc514338cb37ce61a0 # v4 |