Create black-duck-security-scan-ci.yml#40
Conversation
|
|
|
The latest updates on your projects. Learn more about Vercel for GitHub.
|
|
Note Gemini is unable to generate a review for this pull request due to the file types involved not being currently supported. |
Comment MemoryNote This comment is managed by comment memory.It stores persistent context for this thread in the code block at the top of this comment. |
There was a problem hiding this comment.
2 issues found across 1 file
Prompt for AI agents (unresolved issues)
Check if these issues are valid — if so, understand the root cause of each and fix them. If appropriate, use sub-agents to investigate and fix each issue separately.
<file name=".github/workflows/black-duck-security-scan-ci.yml">
<violation number="1" location=".github/workflows/black-duck-security-scan-ci.yml:22">
P2: This will fail on `pull_request` runs from forks because required secrets aren’t available. Add a job-level `if:` to skip fork PRs (or use a safer two-workflow pattern) to avoid noisy failures.</violation>
<violation number="2" location=".github/workflows/black-duck-security-scan-ci.yml:32">
P1: Pin `actions/checkout` to a full commit SHA (this repo already does elsewhere). Using `@v4` is a mutable reference and increases supply-chain risk.</violation>
</file>
Reply with feedback, questions, or to request a fix. Tag @cubic-dev-ai to re-run a review.
|
|
||
| steps: | ||
| - name: Checkout source | ||
| uses: actions/checkout@v4 |
There was a problem hiding this comment.
P1: Pin actions/checkout to a full commit SHA (this repo already does elsewhere). Using @v4 is a mutable reference and increases supply-chain risk.
Prompt for AI agents
Check if this issue is valid — if so, understand the root cause and fix it. At .github/workflows/black-duck-security-scan-ci.yml, line 32:
<comment>Pin `actions/checkout` to a full commit SHA (this repo already does elsewhere). Using `@v4` is a mutable reference and increases supply-chain risk.</comment>
<file context>
@@ -0,0 +1,54 @@
+
+ steps:
+ - name: Checkout source
+ uses: actions/checkout@v4
+ - name: Black Duck SCA scan
+ uses: blackduck-inc/black-duck-security-scan@805cbd09e806b01907bbea0f990723c2bb85abe9
</file context>
| uses: actions/checkout@v4 | |
| uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 |
Pull_request
Summary by cubic
Add a GitHub Actions workflow to run Black Duck SCA/SAST scans (Black Duck, Coverity, Polaris, SRM) on push/PR to main and on a weekly schedule, with results posted to PRs and security events.
New Features
.github/workflows/black-duck-security-scan-ci.ymlblackduck-inc/black-duck-security-scan(pinned) with SCA and SAST via Black Duck, Coverity, Polaris, and SRMmain, plus weekly cron (Tue 21:42 UTC)Migration
BLACKDUCKSCA_URL,COVERITY_URL,POLARIS_SERVER_URL,SRM_URLBLACKDUCKSCA_TOKEN,COVERITY_USER,COVERITY_PASSPHRASE,POLARIS_ACCESS_TOKEN,SRM_API_KEYWritten for commit 028ab96. Summary will update on new commits.