dependency-review.yml 1.0 KB

1234567891011121314151617181920212223242526272829
  1. # Dependency Review Action
  2. #
  3. # This Action will scan dependency manifest files that change as part of a Pull Request,
  4. # surfacing known-vulnerable versions of the packages declared or updated in the PR.
  5. # Once installed, if the workflow run is marked as required,
  6. # PRs introducing known-vulnerable packages will be blocked from merging.
  7. #
  8. # Source repository: https://github.com/actions/dependency-review-action
  9. name: 'Dependency Review'
  10. on: [pull_request]
  11. permissions:
  12. contents: read
  13. jobs:
  14. dependency-review:
  15. runs-on: ubuntu-latest
  16. steps:
  17. - name: Harden the runner (Audit all outbound calls)
  18. uses: step-security/harden-runner@fe104658747b27e96e4f7e80cd0a94068e53901d # v2.16.1
  19. with:
  20. egress-policy: audit
  21. - name: 'Checkout Repository'
  22. uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
  23. with:
  24. persist-credentials: false
  25. - name: 'Dependency Review'
  26. uses: actions/dependency-review-action@2031cfc080254a8a887f58cffee85186f0e49e48 # v4