11---
22name : Security Analysis
3-
3+ permissions : {}
44on :
55 push :
66 branches : [master]
@@ -15,38 +15,44 @@ jobs:
1515 # "Initialize CodeQL" fails on forks and the results would not submit either
1616 if : github.repository_owner == 'controlplaneio'
1717 runs-on : ubuntu-latest
18+ permissions :
19+ contents : read
20+ security-events : write
1821 steps :
1922 - name : Checkout repository
20- uses : actions/checkout@v6
23+ uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
2124
2225 # provide a more modern go until resolved in codeql action
2326 # https://github.com/github/codeql-action/issues/1842#issuecomment-1704398087
2427 - name : Set up Go
25- uses : actions/setup-go@v6
28+ uses : actions/setup-go@4a3601121dd01d1626a1e23e37211e3254c1c06c # v6
2629 with :
2730 go-version-file : go.mod
2831
2932 - name : Initialize CodeQL
30- uses : github/codeql-action/init@v4
33+ uses : github/codeql-action/init@95e58e9a2cdfd71adc6e0353d5c52f41a045d225 # v4
3134 with :
3235 languages : go
3336
3437 - name : Perform CodeQL Analysis
35- uses : github/codeql-action/analyze@v4
38+ uses : github/codeql-action/analyze@95e58e9a2cdfd71adc6e0353d5c52f41a045d225 # v4
3639
3740 trivy :
3841 name : Trivy
3942 runs-on : ubuntu-latest
43+ permissions :
44+ contents : read
45+ security-events : write
4046 steps :
4147 - name : Checkout code
42- uses : actions/checkout@v6
48+ uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
4349
4450 - name : Build an image from Dockerfile
4551 run : |
4652 docker build . -t kubesec:${{ github.sha }}
4753
4854 - name : Run Trivy
49- uses : aquasecurity/trivy-action@0.33.1
55+ uses : aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # 0.35.0
5056 with :
5157 image-ref : kubesec:${{ github.sha }}
5258 format : template
@@ -56,20 +62,24 @@ jobs:
5662 - name : Upload Trivy results to the Security tab
5763 # can't submit scan results on forks
5864 if : github.repository_owner == 'controlplaneio'
59- uses : github/codeql-action/upload-sarif@v4
65+ uses : github/codeql-action/upload-sarif@95e58e9a2cdfd71adc6e0353d5c52f41a045d225 # v4
6066 with :
6167 sarif_file : trivy-results.sarif
6268
6369 trufflehog :
6470 name : TruffleHog
6571 runs-on : ubuntu-latest
72+ permissions :
73+ contents : read
74+ pull-requests : write
75+ checks : write
6676 steps :
6777 - name : Checkout code
68- uses : actions/checkout@v6
78+ uses : actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
6979 with :
7080 fetch-depth : 0
7181 - name : Run Trufflehog
72- uses : trufflesecurity/trufflehog@v3.92 .3
82+ uses : trufflesecurity/trufflehog@47e7b7cd74f578e1e3145d48f669f22fd1330ca6 # v3.94 .3
7383 with :
7484 path : ./
7585 base : " "
0 commit comments