Sha256: a39af9e069c00701e86bae2f75ca31b27ecd40dab93bcac0f3f5103a5e4e7492
Contents?: true
Size: 1.32 KB
Versions: 3
Compression:
Stored size: 1.32 KB
Contents
name: Semgrep on: merge_group: pull_request_target: types: - opened - synchronize push: branches: - master schedule: - cron: '30 0 1,15 * *' permissions: contents: read concurrency: group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.ref }} cancel-in-progress: ${{ github.ref != 'refs/heads/master' }} jobs: authorize: name: Authorize environment: ${{ github.actor != 'dependabot[bot]' && github.event_name == 'pull_request_target' && github.event.pull_request.head.repo.full_name != github.repository && 'external' || 'internal' }} runs-on: ubuntu-latest steps: - run: true run: needs: authorize # Require approval before running on forked pull requests name: Check for Vulnerabilities runs-on: ubuntu-latest container: image: returntocorp/semgrep steps: - if: github.actor == 'dependabot[bot]' || github.event_name == 'merge_group' run: exit 0 # Skip unnecessary test runs for dependabot and merge queues. Artifically flag as successful, as this is a required check for branch protection. - uses: actions/checkout@v4 with: ref: ${{ github.event.pull_request.head.sha || github.ref }} - run: semgrep ci env: SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }}
Version data entries
3 entries across 3 versions & 1 rubygems
Version | Path |
---|---|
auth0-5.16.0 | .github/workflows/semgrep.yml |
auth0-5.15.0 | .github/workflows/semgrep.yml |
auth0-5.14.2 | .github/workflows/semgrep.yml |