-
Notifications
You must be signed in to change notification settings - Fork 11
41 lines (37 loc) · 1.31 KB
/
shiftleft-analysis.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
# This workflow integrates ShiftLeft Scan with GitHub's code scanning feature
# ShiftLeft Scan is a free open-source security tool for modern DevOps teams
# Visit https://slscan.io/en/latest/integrations/code-scan for help
name: ShiftLeft Scan
# This section configures the trigger for the workflow. Feel free to customize depending on your convention
on:
push:
branches:
- main
pull_request:
branches:
- '**'
jobs:
Scan-Build:
# Scan runs on ubuntu, mac and windows
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
# Instructions
# 1. Setup JDK, Node.js, Python etc depending on your project type
# 2. Compile or build the project before invoking scan
# Example: mvn compile, or npm install or pip install goes here
# 3. Invoke ShiftLeft Scan with the github token. Leave the workspace empty to use relative url
- name: Perform ShiftLeft Scan
uses: ShiftLeftSecurity/scan-action@master
env:
WORKSPACE: ""
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
SCAN_AUTO_BUILD: true
with:
output: reports
# Scan can auto-detect the languages, but we want only a Java class scan:
type: java
- name: Upload report
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: reports