Sha256: b3a70b14b613bc54161d2f2ca4b70ad9c67d0fd1d22d7ea2c7d2e258e068da98
Contents?: true
Size: 1.32 KB
Versions: 14
Compression:
Stored size: 1.32 KB
Contents
# This workflow integrates Brakeman with GitHub's Code Scanning feature # Brakeman is a static analysis security vulnerability scanner for Ruby on Rails applications name: Brakeman Scan on: push: branches: [main] pull_request: # The branches below must be a subset of the branches above branches: [main] schedule: - cron: "40 4 * * 2" jobs: brakeman-scan: name: Brakeman Scan runs-on: ubuntu-latest steps: # Checkout the repository to the GitHub Actions runner - name: Checkout uses: actions/checkout@v2 # Customize the ruby version depending on your needs - name: Set up Ruby uses: ruby/setup-ruby@v1 with: ruby-version: "3.0" - name: Setup Brakeman env: BRAKEMAN_VERSION: "5.4" # SARIF support is provided in Brakeman version 4.10+ run: | gem install brakeman --version $BRAKEMAN_VERSION # Execute Brakeman CLI and generate a SARIF output with the security issues identified during the analysis - name: Scan continue-on-error: true run: | brakeman -f sarif -o output.sarif.json . # Upload the SARIF file generated in the previous step - name: Upload SARIF uses: github/codeql-action/upload-sarif@v1 with: sarif_file: output.sarif.json
Version data entries
14 entries across 14 versions & 1 rubygems