-
Notifications
You must be signed in to change notification settings - Fork 0
chore: add govulncheck and gosec CI security scanning (S5) #58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -91,3 +91,31 @@ jobs: | |||||
| name: capiscio-core | ||||||
| env: | ||||||
| CODECOV_TOKEN: ${{ secrets.CODECOV_TOKEN }} | ||||||
|
|
||||||
| security: | ||||||
| name: Security Scanning | ||||||
| runs-on: ubuntu-latest | ||||||
| steps: | ||||||
| - uses: actions/checkout@v4 | ||||||
|
|
||||||
| - uses: actions/setup-go@v5 | ||||||
| with: | ||||||
| go-version-file: 'go.mod' | ||||||
|
|
||||||
| - name: Run govulncheck | ||||||
| continue-on-error: true | ||||||
| run: | | ||||||
| go install golang.org/x/vuln/cmd/govulncheck@latest | ||||||
|
||||||
| go install golang.org/x/vuln/cmd/govulncheck@latest | |
| go install golang.org/x/vuln/cmd/govulncheck@v1.1.3 |
Copilot
AI
Mar 29, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Using securego/gosec@master is unsafe and non-deterministic because the workflow will execute whatever is on master at run time. Pin the action to a tagged release or a commit SHA to prevent unexpected changes or supply-chain compromise.
| uses: securego/gosec@master | |
| uses: securego/gosec@v2.22.0 |
Copilot
AI
Mar 29, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The repo’s build/test jobs run with -tags opa_no_wasm, but this security job runs govulncheck/gosec with default build tags. That means tagged code (e.g., //go:build opa_no_wasm files) won’t be analyzed. Consider setting GOFLAGS=-tags=opa_no_wasm (or equivalent tool flags) for both scanners to match the code paths actually built and tested in CI.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This job uses
go-version-file: go.modwhile other jobs in this workflow hard-code Go versions. To avoid accidental version skew across jobs, consider standardizing on a single approach (e.g., usego-version-fileeverywhere or pin the exact samego-version).