-
Notifications
You must be signed in to change notification settings - Fork 1
62 lines (54 loc) · 1.73 KB
/
codeql.yml
File metadata and controls
62 lines (54 loc) · 1.73 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
name: CodeQL
# GitHub-native security analysis. Runs on push to main, on PRs that touch
# scanned source, and weekly to catch advisories published after merge.
#
# Languages covered: JavaScript/TypeScript (scripts/, mcp/, cli/, site/).
# We do not scan vendored third-party assets under site/vendor/.
#
# Suppression policy: NONE. All findings are fixed, not suppressed.
# Tea leaf from upstream PR reviews: bigger projects gate on CodeQL clean,
# and we want our own house in order before pitching integrations.
on:
push:
branches: [main]
pull_request:
branches: [main]
merge_group:
schedule:
- cron: "23 5 * * 1"
permissions:
contents: read
jobs:
analyze:
name: Analyze (${{ matrix.language }})
runs-on: ubuntu-latest
timeout-minutes: 15
permissions:
security-events: write
packages: read
actions: read
contents: read
strategy:
fail-fast: false
matrix:
language: ["javascript-typescript"]
steps:
# pin: v6.0.0 -- actions/checkout
- name: Checkout
uses: actions/checkout@1af3b93b6815bc44a9784bd300feb67ff0d1eeb3
# pin: v4.35.4 -- github/codeql-action
- name: Initialize CodeQL
uses: github/codeql-action/init@68bde559dea0fdcac2102bfdf6230c5f70eb485e
with:
languages: ${{ matrix.language }}
queries: security-and-quality
config: |
paths-ignore:
- site/vendor/**
- "**/node_modules/**"
- "**/dist/**"
# pin: v4.35.4 -- github/codeql-action
- name: Perform CodeQL analysis
uses: github/codeql-action/analyze@68bde559dea0fdcac2102bfdf6230c5f70eb485e
with:
category: "/language:${{ matrix.language }}"