Sha256: be0b2af4eceb804979344de7d4d51a2a6a81b0a0b79ccb9dae5c72c417419950
Contents?: true
Size: 1.29 KB
Versions: 1
Compression:
Stored size: 1.29 KB
Contents
# This workflow integrates Brakeman with GitHub's Code Scanning feature # Brakeman is a static analysis security vulnerability scanner for Ruby on Rails applications name: Brakeman Scan on: push: branches: [ main ] pull_request: # The branches below must be a subset of the branches above branches: [ main ] schedule: - cron: '44 7 * * 1' jobs: brakeman-scan: name: Brakeman Scan runs-on: ubuntu-latest steps: # Checkout the repository to the GitHub Actions runner - name: Checkout uses: actions/checkout@v2 # Customize the ruby version depending on your needs - name: Setup Ruby uses: actions/setup-ruby@v1 with: ruby-version: '2.7' - name: Setup Brakeman env: BRAKEMAN_VERSION: '4.10' # SARIF support is provided in Brakeman version 4.10+ run: | gem install brakeman --version $BRAKEMAN_VERSION # Execute Brakeman CLI and generate a SARIF output with the security issues identified during the analysis - name: Scan continue-on-error: true run: | brakeman -f sarif -o output.sarif.json . # Upload the SARIF file generated in the previous step - name: Upload SARIF uses: github/codeql-action/upload-sarif@v1 with: sarif_file: output.sarif.json
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
flow_client-0.1.2 | .github/workflows/brakeman-analysis.yml |