From 997afcdd9e1a30e2c9af0da66fbe01158523fcbd Mon Sep 17 00:00:00 2001 From: Tanishq Dubey Date: Fri, 21 Mar 2025 10:23:09 -0400 Subject: [PATCH] Add Semgrep Scanning --- .gitea/workflows/semgrep-ce.yaml | 38 ++++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 .gitea/workflows/semgrep-ce.yaml diff --git a/.gitea/workflows/semgrep-ce.yaml b/.gitea/workflows/semgrep-ce.yaml new file mode 100644 index 0000000..24dedc2 --- /dev/null +++ b/.gitea/workflows/semgrep-ce.yaml @@ -0,0 +1,38 @@ +# Name of this GitHub Actions workflow. +name: Semgrep CE scan + +on: + # Scan changed files in PRs (diff-aware scanning): + pull_request: {} + # Scan on-demand through GitHub Actions interface: + workflow_dispatch: {} + # Scan mainline branches and report all findings: + push: + branches: ["master", "main"] + # Schedule the CI job (this method uses cron syntax): + schedule: + - cron: '20 17 * * *' # Sets Semgrep to scan every day at 17:20 UTC. + # It is recommended to change the schedule to a random time. + +permissions: + contents: read + +jobs: + semgrep: + # User definable name of this GitHub Actions job. + name: semgrep-oss/scan + # If you are self-hosting, change the following `runs-on` value: + runs-on: ubuntu-latest + + container: + # A Docker image with Semgrep installed. Do not change this. + image: semgrep/semgrep + + # Skip any PR created by dependabot to avoid permission issues: + if: (github.actor != 'dependabot[bot]') + + steps: + # Fetch project source with GitHub Actions Checkout. Use either v3 or v4. + - uses: actions/checkout@v4 + # Run the "semgrep scan" command on the command line of the docker image. + - run: semgrep scan --config auto \ No newline at end of file