Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 9 additions & 9 deletions .github/workflows/security-checks.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,22 +8,22 @@ on:
permissions:
contents: read
jobs:
trivy:
name: Trivy
grype:
name: Grype
runs-on: ubuntu-latest
steps:
- name: Checkout Repository
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6

- name: Scan repo
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0
uses: anchore/scan-action@7037fa011853d5a11690026fb85feee79f4c946c # v7.3.2
id: grype-scan
Copy link

Copilot AI Mar 20, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The step id: grype-scan is currently unused in this workflow. Consider removing it to reduce noise, or use it (e.g., to reference outputs) if you intend to consume scan results later in the job.

Suggested change
id: grype-scan

Copilot uses AI. Check for mistakes.
with:
scan-type: 'fs'
scan-ref: '.'
scanners: 'vuln,secret,config'
exit-code: '1'
ignore-unfixed: 'true'
severity: 'MEDIUM,HIGH,CRITICAL'
path: "."
fail-build: true
Comment on lines +19 to +23
Copy link

Copilot AI Mar 20, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This migration drops the previous Trivy checks for secret and config scanning (it now runs only Grype vulnerability scanning). If those checks are still desired under this "Security Checks" workflow, add equivalent steps/tools (e.g., a dedicated secret scanner + IaC/config misconfig scanner) or explicitly document that this workflow is now vuln-only to avoid an unintentional security coverage regression.

Copilot uses AI. Check for mistakes.
only-fixed: true
severity-cutoff: "medium"
output-format: "table"

npm-audit:
name: PNPM Audit
Expand Down
Loading