-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Include a GitHub workflow for vulnerability scanning #1174
base: master
Are you sure you want to change the base?
Conversation
- name: Upload Test results | ||
uses: actions/upload-artifact@b4b15b8c7c6ac21ea08fcf65892d2ee8f75cf882 # v4 | ||
with: | ||
name: Depcheck report |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lets give it a full name like : "Dependency Check report"
At the moment the report is just uploaded as an aritfact. What is the intention behind this? Will there be an automated check of the report or anything like that in the future? |
I first wanted to check if we have any vulnerabilities. We could set
They seem to be excluded, but to be honest I don't understand how it works. For me this behavior is correct since we only want to check the current platform and also keep the checking fast.
If we want to check it, the vulnerability check would have to be done in https://github.com/mbeddr/build.publish.jdk. Since we don't build anything here, the generic JDK is fine.
This is the GitHub action: https://github.com/dependency-check/Dependency-Check_Action |
No description provided.