scorecard.yml 1.2 KB

123456789101112131415161718192021222324252627282930313233343536373839
  1. name: Scorecard supply-chain security
  2. on:
  3. branch_protection_rule:
  4. schedule:
  5. - cron: '27 2 * * 3'
  6. push:
  7. branches: [ "main" ]
  8. jobs:
  9. analysis:
  10. name: Scorecard analysis
  11. runs-on: ubuntu-latest
  12. permissions:
  13. # Needed to upload the results to code-scanning dashboard.
  14. security-events: write
  15. # Needed to publish results and get a badge (see publish_results below).
  16. id-token: write
  17. steps:
  18. - uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
  19. with:
  20. egress-policy: audit
  21. - name: "Checkout code"
  22. uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
  23. with:
  24. persist-credentials: false
  25. - name: "Run analysis"
  26. uses: ossf/scorecard-action@4eaacf0543bb3f2c246792bd56e8cdeffafb205a # v2.4.3
  27. with:
  28. results_file: results.sarif
  29. results_format: sarif
  30. publish_results: true
  31. # Upload the results to GitHub's code scanning dashboard.
  32. - name: "Upload to code-scanning"
  33. uses: github/codeql-action/upload-sarif@cdefb33c0f6224e58673d9004f47f7cb3e328b89 # v3.29.5
  34. with:
  35. sarif_file: results.sarif