Skip to content

Bump github/codeql-action from 2.21.5 to 2.22.4 #1452

Bump github/codeql-action from 2.21.5 to 2.22.4

Bump github/codeql-action from 2.21.5 to 2.22.4 #1452

# A sample workflow which checks out your Infrastructure as Code Configuration files,
# such as Kubernetes, Helm & Terraform and scans them for any security issues.
# The results are then uploaded to GitHub Security Code Scanning
#
# For more examples, including how to limit scans to only high-severity issues
# and fail PR checks, see https://github.com/snyk/actions/
name: Workflow for Python using Snyk
on: push
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}
cancel-in-progress: true
permissions:
contents: read
jobs:
security:
if: github.actor!= 'dependabot-preview[bot]'
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@8ca2b8b2ece13480cda6dacd3511b49857a23c09 # v2.5.1
with:
egress-policy: audit # TODO: change to 'egress-policy: block' after couple of runs
- uses: actions/checkout@3df4ab11eba7bda6032a0b82a6bb43b11571feac # master
- name: Run Snyk to check for vulnerabilities
uses: snyk/actions/python-3.8@299cde98a08ff8b1c2bfde1e5a067bce67a6d2b8 # master
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}