name: "CodeQL Advanced" on: push: branches: [ "main" ] pull_request: branches: [ "main" ] permissions: contents: read jobs: analyze: name: Analyze project runs-on: ubuntu-latest permissions: # required for all workflows security-events: write packages: read actions: read strategy: fail-fast: false steps: - uses: step-security/harden-runner@ec9f2d5744a09debf3a187a3f4f675c53b671911 # v2.13.0 with: egress-policy: audit - name: Checkout repository uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0 # Initializes the CodeQL tools for scanning. - name: Initialize CodeQL uses: github/codeql-action/init@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.5 with: languages: go build-mode: autobuild - name: Perform CodeQL Analysis uses: github/codeql-action/analyze@3c3833e0f8c1c83d449a7478aa59c036a9165498 # v3.29.5