Skip to content

Security Scan #72

Security Scan

Security Scan #72

Workflow file for this run

name: Security Scan
on:
push:
branches: [ main, develop ]
pull_request:
branches: [ main, develop ]
schedule:
- cron: '0 0 * * *' # Run daily at midnight
jobs:
security:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Set up Flutter
uses: subosito/flutter-action@v2
with:
flutter-version: '3.13.0'
channel: 'stable'
- name: Install dependencies
run: flutter pub get
- name: Run dependency vulnerability scan
uses: aquasecurity/trivy-action@master
with:
scan-type: 'fs'
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
- name: Upload Trivy scan results
uses: github/codeql-action/upload-sarif@v2
if: always()
with:
sarif_file: 'trivy-results.sarif'
- name: Run SAST scan
uses: github/codeql-action/analyze@v2
with:
languages: javascript, typescript
- name: Check for secrets
uses: gitleaks/gitleaks-action@v2
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
compliance:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Check license compliance
uses: fossas/fossa-action@main
with:
api-key: ${{ secrets.FOSSA_API_KEY }}
- name: Run CycloneDX SBOM generator
uses: CycloneDX/gh-dotnet-generate-sbom@v1
with:
path: .
output: bom.xml