Change workflow to checkout config as well. #4
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Scan GitHub Action workflows files for security issues | |
on: | |
pull_request: {} | |
workflow_dispatch: {} | |
push: | |
paths: | |
- '.github/workflows/**.ya?ml' | |
permissions: | |
contents: read | |
security-events: write | |
jobs: | |
semgrep: | |
name: semgrep-oss/scan | |
runs-on: ubuntu-latest | |
container: | |
image: semgrep/semgrep | |
# Skip any PR created by dependabot to avoid permission issues: | |
if: (github.actor != 'dependabot[bot]') | |
steps: | |
- name: Checkout Workflow Config | |
uses: actions/checkout@v4 | |
env: | |
GH_REPO_OWNER: ${{ github.repository_owner }} | |
with: | |
repository: 'http://github.com/${{ env.GH_REPO_OWNER }}/.github' | |
path: action_scanning | |
- name: Checkout Code | |
uses: actions/checkout@v4 | |
with: | |
path: code_to_scan | |
- name: Run Actions semgrep scan | |
run: semgrep scan --sarif --config action_scanning/semgrep-rules/actions code_to_scan >> semgrep-results-actions.sarif | |
- name: Save Actions SARIF results as artifact | |
uses: actions/upload-artifact@v4 | |
with: | |
name: semgrep-scan-results-actions | |
path: semgrep-results-actions.sarif | |
- name: Upload Actions SARIF result to the GitHub Security Dashboard | |
uses: github/codeql-action/upload-sarif@v3 | |
with: | |
sarif_file: semgrep-results-actions.sarif | |
if: always() |