diff --git a/.github/workflows/semgrep.yml b/.github/workflows/semgrep.yml deleted file mode 100644 index 46bd87fcf..000000000 --- a/.github/workflows/semgrep.yml +++ /dev/null @@ -1,36 +0,0 @@ -# Name of this GitHub Actions workflow. -name: Semgrep OSS scan - -on: - # Scan changed files in PRs (diff-aware scanning): - pull_request: {} - # Scan on-demand through GitHub Actions interface: - workflow_dispatch: {} - # Scan mainline branches and report all findings: - push: - branches: ["master", "main"] - # Schedule the CI job (this method uses cron syntax): - schedule: - - cron: '25 19 * * *' # Sets Semgrep to scan every day at 19:25 UTC. - # It is recommended to change the schedule to a random time. - -jobs: - semgrep: - # User definable name of this GitHub Actions job. - name: semgrep-oss/scan - # If you are self-hosting, change the following `runs-on` value: - runs-on: ubuntu-latest - - container: - # A Docker image with Semgrep installed. Do not change this. - image: semgrep/semgrep - - # Skip any PR created by dependabot to avoid permission issues: - if: (github.actor != 'dependabot[bot]') - - steps: - # Fetch project source with GitHub Actions Checkout. - - uses: actions/checkout@v3 - # Run the "semgrep scan" command on the command line of the docker image. - - run: semgrep scan --config auto - \ No newline at end of file diff --git a/README.md b/README.md index 656401db0..b8203e0bd 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,5 @@ # WebGoat: A deliberately insecure Web Application -Adding this line to test a merge for the semgrep Action running vanilla in Actions - [![Build](https://github.com/WebGoat/WebGoat/actions/workflows/build.yml/badge.svg?branch=develop)](https://github.com/WebGoat/WebGoat/actions/workflows/build.yml) [![java-jdk](https://img.shields.io/badge/java%20jdk-17-green.svg)](https://jdk.java.net/) [![OWASP Labs](https://img.shields.io/badge/OWASP-Lab%20project-f7b73c.svg)](https://owasp.org/projects/)