Skip to content
This repository has been archived by the owner on Oct 13, 2023. It is now read-only.

Latest commit

 

History

History
39 lines (29 loc) · 1.05 KB

security-audit.md

File metadata and controls

39 lines (29 loc) · 1.05 KB

Security audit workflow

This workflow is executed on schedule and performs an audit for crates with security vulnerabilities.

When it can be used?

When you agree that it is important to have no dependencies with security vulnerabilities.

name: Security audit
on:
  schedule:
    - cron: '0 0 * * *'
jobs:
  audit:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v2
      - uses: actions-rs/audit-check@v1
        with:
          token: ${{ secrets.GITHUB_TOKEN }}

This Action will be executed periodically at midnight of each day and check if there any new advisories appear for crate dependencies.
For each new advisory (including informal) an issue will be created.

Alternatively, you can use it to audit changes (commits or pull requests), see an example here.

Can I tune it?

Sure!

This workflow is using following Actions to execute the pipeline, see their pages for the available options:

  1. actions-rs/audit-check