-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
using ai-codewise int for dogfooding #300
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please find StepSecurity AI-CodeWise code comments inline.
Feedback
We appreciate your feedback in helping us improve the service! To provide feedback, please use emojis on this comment. If you find a comment helpful, give it a 👍. If they aren't useful, kindly express that with a 👎. If you have questions or detailed feedback, please create n GitHub issue in StepSecurity/AI-CodeWise.
@@ -1,27 +1,23 @@ | |||
name: Code Review | |||
on: | |||
pull_request: | |||
branches: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- [Low]Use specific branches instead of all branches
The workflow will trigger for all branches. Use a specific branch to trigger the workflow
@@ -1,27 +1,23 @@ | |||
name: Code Review | |||
on: | |||
pull_request: | |||
branches: | |||
- main | |||
- int | |||
permissions: | |||
contents: read |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- [Low]Remove unnecessary permission
Contents read permission is not needed since pull-requests: read already includes it. Remove contents: read permission
steps: | ||
- name: Harden Runner | ||
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0 | ||
with: | ||
egress-policy: audit |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- [Medium]Limit egress traffic
The workflow runner allows all outgoing traffic by default. Set the egress-policy to either 'block-all' or 'audit' (requires permission write), or list specific allowed endpoints with allowed-endpoints key
steps: | ||
- name: Harden Runner | ||
uses: step-security/harden-runner@128a63446a954579617e875aaab7d2978154e969 # v2.4.0 | ||
with: | ||
egress-policy: audit | ||
disable-sudo: true |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- [High]Do not disable sudo without proper justification
Disabling sudo may cause the runner to fail executing some steps. If there is no proper justification for disabling sudo, remove it
|
||
- name: Code Review | ||
uses: docker://ghcr.io/step-security/code-reviewer/int:latest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- [Informational]Update the Docker image to the latest stable release
The image used for the Code Review step does not use the latest stable release. Update the Docker image to the latest stable release
No description provided.