From ed68aadd2bde64491dbb6f8c2c27ee9ee95bbe79 Mon Sep 17 00:00:00 2001 From: Emmanuel T Odeke Date: Fri, 23 Sep 2022 13:26:55 -0700 Subject: [PATCH] .github/workflows: add cosmos/gosec vulnerability scanner for each Push/PR (#9464) Adds a code vulnerability scanner that'll flag issues and issue advisories from cosmos/gosec https://github.com/cosmos/gosec --- .github/workflows/gosec.yml | 41 +++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 .github/workflows/gosec.yml diff --git a/.github/workflows/gosec.yml b/.github/workflows/gosec.yml new file mode 100644 index 000000000..016234b60 --- /dev/null +++ b/.github/workflows/gosec.yml @@ -0,0 +1,41 @@ +name: Run Gosec +on: + pull_request: + paths: + - '**/*.go' + - 'go.mod' + - 'go.sum' + push: + branches: + - main + - 'feature/*' + - 'v0.37.x' + - 'v0.34.x' + paths: + - '**/*.go' + - 'go.mod' + - 'go.sum' + +jobs: + Gosec: + permissions: + security-events: write + + runs-on: ubuntu-latest + env: + GO111MODULE: on + steps: + - name: Checkout Source + uses: actions/checkout@v3 + + - name: Run Gosec Security Scanner + uses: cosmos/gosec@master + with: + # Let the report trigger a failure with the Github Security scanner features. + args: "-no-fail -fmt sarif -out results.sarif ./..." + + - name: Upload SARIF file + uses: github/codeql-action/upload-sarif@v2 + with: + # Path to SARIF file relative to the root of the repository + sarif_file: results.sarif