Skip to content

Conversation

@riatzukiza
Copy link
Owner

Summary

  • add a Bun audit workflow with severity gating and JSON artifact upload
  • integrate the official OSV scanner action and publish its SARIF report
  • configure OWASP Dependency-Check to use a CI-only npm lockfile and upload reports
  • orchestrate the security scans sequentially through a parent workflow

Testing

  • not run (CI only)

https://chatgpt.com/codex/tasks/task_e_68fe8f682c9083248db706b52b2a5b38

@coderabbitai
Copy link

coderabbitai bot commented Oct 26, 2025

Important

Review skipped

Auto reviews are disabled on base/target branches other than the default branch.

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Note

Other AI code review bot(s) detected

CodeRabbit has detected other AI code review bot(s) in this pull request and will avoid duplicating their findings in the review comments. This may lead to a less comprehensive review.

✨ Finishing touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment
  • Commit unit tests in branch codex/add-github-actions-for-security-audits

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

Comment on lines 8 to 13
jobs:
osv:
runs-on: ubuntu-latest

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Grant security-events permission for OSV uploads

The OSV scanner action uploads its SARIF output via github/codeql-action/upload-sarif by default. Without declaring permissions: { security-events: write }, the job runs with a read-only token on pull requests and the upload step fails with “Resource not accessible by integration,” causing the workflow to fail and the report not to publish. Add the required permission scope to the job or workflow.

Useful? React with 👍 / 👎.

Copy link
Owner Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@codex fix comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Summary

  • Granted the OSV scan workflow explicit contents read and security-events write permissions so its SARIF upload succeeds on pull requests. .github/workflows/osv-scan.ymlL9-L27
  • Updated the OWASP Dependency-Check workflow to create the temporary npm lockfile with npm install --package-lock-only, which works without a pre-existing lockfile. .github/workflows/odc.ymlL15-L33

Testing

  • Not run (not requested).

View task →

thdxr and others added 27 commits October 31, 2025 08:36
- add job-level if: to run only on release/workflow_dispatch
- add Resolve release tag step (supports manual input + last release fallback)
- harden MpCmdRun.exe resolution on windows-latest

This prevents PR runs from failing when github.event.release.tag_name is undefined and makes manual runs usable.
- Add PR/push jobs for ClamAV (Linux) and Windows Defender (Windows)
- Keep release/workflow_dispatch jobs for scanning published assets
- No secret usage in PR/push jobs; uses repo/build outputs or repo archive
- Upload PR scan payload/logs as artifacts
- Detect common stacks and attempt install+build for each
- Package best available outputs (dist/build/target/release) for scanning
- Keep release/manual job unchanged
- Enable corepack; prep yarn if yarn.lock present
- Make Node/Rust/Go builds best-effort (won't fail the job)
- Use tar.gz instead of zip to avoid zip dependency
- Keep scanning entire dist-pr directory with --scan-archive=yes
- Detect bun.lockb and use oven-sh/setup-bun@v1
- Run `bun install` + `bun run build` before packaging
- Keep Node/Rust/Go heuristics as fallback
… shell

- Replace oven-sh/setup-bun with curl installer and PATH export
- Drop pnpm/action-setup; use corepack to activate pnpm/yarn
- Replace dtolnay/rust-toolchain with rustup bootstrap
- Add defaults.run.shell: bash; small permissions tweaks
- Keep Go using first‑party actions/setup-go@v5
- Include schedule in release job guard to avoid skipped runs
… zip contention)

- owasp: use dependency-check/Dependency-Check_Action@1.1.0 and cache DC data
- clamav: install freshclam db before clamscan; package build outputs for PRs; scan release assets
- defender: handle zip handle contention; scan release assets and surface detections
…args --out); avoid zip handle contention by using unique filename and glob for scan/upload
…o bun; stage outputs; extract before clamscan for real file counts
…up-bun for back-compat with existing workflows
…vert non-security change to script/format.ts
…s artifact and defender job scans extracted dir
…/.bun if cached version != requested; keep bun install step
… verify exact version. build-package now uses this action.
@riatzukiza riatzukiza force-pushed the codex/add-github-actions-for-security-audits branch from b3a9a69 to b9589eb Compare October 31, 2025 13:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants