dependency-review.yml 997 B

123456789101112131415161718192021222324252627
  1. # Dependency Review Action
  2. #
  3. # This Action will scan dependency manifest files that change as part of a Pull Request,
  4. # surfacing known-vulnerable versions of the packages declared or updated in the PR.
  5. # Once installed, if the workflow run is marked as required,
  6. # PRs introducing known-vulnerable packages will be blocked from merging.
  7. #
  8. # Source repository: https://github.com/actions/dependency-review-action
  9. name: 'Dependency Review'
  10. on: [pull_request]
  11. permissions:
  12. contents: read
  13. jobs:
  14. dependency-review:
  15. runs-on: ubuntu-latest
  16. steps:
  17. - name: Harden the runner (Audit all outbound calls)
  18. uses: step-security/harden-runner@df199fb7be9f65074067a9eb93f12bb4c5547cf2 # v2.13.3
  19. with:
  20. egress-policy: audit
  21. - name: 'Checkout Repository'
  22. uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
  23. - name: 'Dependency Review'
  24. uses: actions/dependency-review-action@3c4e3dcb1aa7874d2c16be7d79418e9b7efd6261 # v4