Integrate SCA and static security scanning workflows #80
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Purpose
Resolves the need for automated security scanning infrastructure. Currently no SCA or static analysis scans are present for the CDS repository.
Goals
Implement automated security scanning to:
Approach
Added three GitHub Actions workflows with scheduled and event-triggered execution:
FOSSA SCA Scan (
.github/workflows/fossa-scan.yml)FOSSA_API_KEYsecret configurationCodeQL Analysis (
.github/workflows/codeql-analysis.yml)security-extendedandsecurity-and-qualityquery suitesTrivy Security Scan (
.github/workflows/trivy-scan.yml)All workflows trigger on push/PR to main/mvp branches and run weekly on Mondays (staggered at 00:00, 02:00, 04:00 UTC). Explicit permissions configured per security best practices.
User stories
Release note
Integrated FOSSA, CodeQL, and Trivy security scanning workflows with automated execution on code changes and weekly schedules.
Documentation
Added
docs/SECURITY_SCANNING.mdwith setup instructions, scan interpretation guide, and troubleshooting steps. UpdatedREADME.mdto reference security scanning documentation.Training
N/A - Infrastructure change, no user-facing training impact
Certification
N/A - Internal security tooling, no certification impact
Marketing
N/A - Security infrastructure addition
Automation tests
Security checks
Samples
N/A - Security scanning infrastructure
Related PRs
None
Migrations (if applicable)
N/A - New feature addition
Test environment
GitHub Actions runners (ubuntu-latest) with Go 1.24.0
Learning
Reviewed GitHub Advanced Security documentation, FOSSA/CodeQL/Trivy integration patterns, and SARIF output format specifications for Security tab integration.
Original prompt
✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.