Skip to content

chore(deps): Bump python-semantic-release/python-semantic-release from 10.0.2 to 10.5.3 #10

chore(deps): Bump python-semantic-release/python-semantic-release from 10.0.2 to 10.5.3

chore(deps): Bump python-semantic-release/python-semantic-release from 10.0.2 to 10.5.3 #10

Workflow file for this run

# This file is part of CycloneDX Python
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# SPDX-License-Identifier: Apache-2.0
# Copyright (c) OWASP Foundation. All Rights Reserved.
# For details of what checks are run for PRs please refer below
# docs: https://docs.github.com/en/actions/reference/workflow-syntax-for-github-actions
name: Workflow Security Analysis
on:
pull_request:
paths:
- '.github/workflows/**'
- '.github/dependabot.yml'
push:
paths:
- ".github/workflows/**"
- ".github/dependabot.yml"
schedule:
# weekly scan: every Saturday at 00:00 UTC
- cron: '0 0 * * 6'
concurrency:
group: '${{ github.workflow }}-${{ github.ref }}'
cancel-in-progress: true
permissions: {}
jobs:
zizmor:
name: Harden GitHub Workflows (zizmor)
runs-on: ubuntu-latest
timeout-minutes: 10
permissions:
contents: read
steps:
- name: Checkout
# see https://github.com/actions/checkout
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6
with:
persist-credentials: false
- name: Run zizmor 🌈
# see https://github.com/zizmorcore/zizmor-action
uses: zizmorcore/zizmor-action@b1d7e1fb5de872772f31590499237e7cce841e8e # v0.5.3
with:
# advanced-security: false => emit findings as workflow-command annotations (::error file=…) rather than
# uploading a SARIF report to GitHub's Security tab.
# Uploading SARIF requires `security-events: write` and GitHub Advanced Security (GHAS),
# both of which are unnecessary here and would violate the least-privilege policy.
# The two modes are mutually exclusive: advanced-security must be false for
# annotations to take effect.
advanced-security: false
annotations: true