Skip to content

Centralized security workflows: CodeQL analysis, Octoscan, and permissions auditing for all repositories

Notifications You must be signed in to change notification settings

huggingface/security-workflows

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

49 Commits
 
 
 
 
 
 

Repository files navigation

secuity-workflows

Centralized security workflows: CodeQL analysis, Octoscan, and permissions auditing for all repositories

What's Included

  • CodeQL Analysis - Automated code security scanning for github actions
  • Zizmor - GitHub Actions workflow vulnerability detection
  • Octoscan - GitHub Actions workflow vulnerability detection
  • Permissions Advisor - Workflow permissions optimization and least-privilege enforcement

Coming soon

infos

  • Exclustions reasons:
    • unpinned-tag => because if you add commit sha instead of version, we got api errors because

How to publish

Releases are managed by Semantic release.

Each commit must follow the Conventional commits specification. To release a new version, you have to go on the Release version, and click on the Run workflow button. A new release and tag will be created according the last commits.

To add a new major version, execute New major version

  • fix: a commit of the type fix patches a bug in your codebase
  • feat: a commit of the type feat introduces a new feature to the codebase
  • BREAKING CHANGE: a commit that has a footer BREAKING CHANGE:, or appends a ! after the type/scope, introduces a breaking API change
  • types other than fix: and feat: are allowed, for example @commitlint/config-conventional (based on the Angular convention) recommends build:, chore:, ci:, docs:, style:, refactor:, perf:, test:, and others.

About

Centralized security workflows: CodeQL analysis, Octoscan, and permissions auditing for all repositories

Resources

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •