Skip to content

👷 ci: add snyk security scanning workflow #946

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 20 commits into from
Jun 4, 2025
Merged

Conversation

w3bdesign
Copy link
Owner

This workflow performs vulnerability scanning with Snyk on both PRs and pushes to main. It uploads results to GitHub Security tab and monitors dependencies on the main branch for continuous security oversight.

This workflow performs vulnerability scanning with Snyk on both PRs and
pushes to main. It uploads results to GitHub Security tab and monitors
dependencies on the main branch for continuous security oversight.

AI: I've analyzed the git diff and provided a commit message that follows the required format. The message includes an emoji, type, description, and body that explains what the commit does and why, all formatted according to the specifications.
@w3bdesign w3bdesign self-assigned this Jun 4, 2025
@w3bdesign w3bdesign linked an issue Jun 4, 2025 that may be closed by this pull request
The cache configuration in actions/setup-node depends on pnpm being
installed first. This change reorders the steps to ensure pnpm is available
before the node setup attempts to use it for caching.
Copy link

vercel bot commented Jun 4, 2025

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
dfweb-v4 ✅ Ready (Inspect) Visit Preview 💬 Add feedback Jun 4, 2025 3:03pm

Update PNPM installation to use "latest-8" instead of just "8" to ensure
we always get the latest patch version while staying on major version 8.
The workflow was using pnpm/action-setup@v3 with version "latest-8", which
has been upgraded to v4 with a specific version 9. This standardizes the
pnpm version across the project.
Temporarily removed the continue-on-error flag from the Snyk GitHub action
to properly debug why the step is failing instead of silently continuing.
Improve Snyk security scanning by adding organization ID parameter and
installing dependencies for the studio directory. This ensures proper
project tracking and complete vulnerability detection across all modules.

AI: I've created a commit message that follows the requested format, describing the changes to the CI workflow file. The message includes the appropriate emoji for CI changes, a clear description, and a detailed body explaining what was changed and why it matters.
Copy link

vercel bot commented Jun 4, 2025

Deployment failed with the following error:

Resource is limited - try again in 3 hours (more than 100, code: "api-deployments-free-per-day").

w3bdesign added 2 commits June 4, 2025 17:13
The workflow now uses the default organization associated with the API token,
removing unnecessary environment variables and command arguments. This
simplifies the configuration while maintaining the same functionality.
Copy link

vercel bot commented Jun 4, 2025

Deployment failed with the following error:

Resource is limited - try again in 2 hours (more than 100, code: "api-deployments-free-per-day").

w3bdesign added 3 commits June 4, 2025 17:31
Restore continue-on-error flag to prevent pipeline failures while removing
the SARIF file generation and upload to GitHub Security tab to simplify
the workflow.
The comment "Standardizing to v4" was incorrectly placed on the action
version line instead of with the actual version specification where a
similar comment already exists.
Remove continue-on-error setting to enforce vulnerability detection and
add SARIF file generation for better visibility of security issues in
GitHub's Security tab. This change enables automated security reporting
while maintaining high severity threshold checks.
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

w3bdesign added 9 commits June 4, 2025 17:49
This adds the ejs (Embedded JavaScript) templating library as a project
dependency to enable server-side HTML rendering with dynamic content.
The addition of the EJS template engine will enable server-side HTML
rendering with embedded JavaScript templates for dynamic content generation.
The ejs package was not being used in the project and has been
removed from package.json to maintain a clean dependency list and
reduce potential security vulnerabilities.
The workflow configuration is cleaned up by removing unnecessary comments that
were explaining configuration details. This improves readability of the
workflow file while maintaining the same functionality.
Implement automated security scanning with Snyk to detect vulnerabilities
in open-source dependencies on every PR and push to main branch. This
integration enhances the project's security posture by providing
continuous monitoring.
@w3bdesign w3bdesign merged commit 09a1766 into main Jun 4, 2025
8 of 10 checks passed
Copy link

sonarqubecloud bot commented Jun 4, 2025

@w3bdesign w3bdesign deleted the 945-security-scanning branch June 4, 2025 16:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Security scanning?
1 participant