Skip to content

chore(deps): bump @inquirer/ansi from 1.0.1 to 1.0.2 #764

chore(deps): bump @inquirer/ansi from 1.0.1 to 1.0.2

chore(deps): bump @inquirer/ansi from 1.0.1 to 1.0.2 #764

Workflow file for this run

# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
#
# Sobelow is a security-focused static analysis tool for the Phoenix framework. https://sobelow.io/
#
# To use this workflow, you must have GitHub Advanced Security (GHAS) enabled for your repository.
#
# Instructions:
# 2. Follow the annotated workflow below and make any necessary modifications then save the workflow to your repository
# and review the "Security" tab once the action has run.
# This GitHub Actions workflow is named "Sobelow" and is triggered on push and pull request events to the "main" branch,
# as well as on a scheduled cron job every Friday at 22:25 UTC.
#
# The workflow has read permissions for repository contents.
#
# The "security-scan" job within the workflow has the following permissions:
# - Write access to contents for actions/checkout to fetch code.
# - Write access to security events for github/codeql-action/upload-sarif to upload SARIF results.
# - Read access to actions, required only for private repositories by github/codeql-action/upload-sarif to get the Action run status.
#
# The job runs on the latest Ubuntu runner and includes the following steps:
# 1. Harden Runner: Uses the step-security/harden-runner action to enhance security by disabling sudo, blocking egress traffic,
# and allowing specific endpoints.
# 2. Checkout Code: Uses the actions/checkout action to fetch the repository code.
# 3. Run Sobelow Action: Uses the sobelow/action to perform a security scan.
name: Sobelow
on:
push:
branches: ["main"]
pull_request:
branches: ["main"]
schedule:
- cron: "25 22 * * 5"
permissions:
contents: read
concurrency:
group: sobelow-${{ github.ref }}
cancel-in-progress: false
jobs:
security-scan:
permissions:
contents: write # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
runs-on: ubuntu-latest
steps:
- name: Harden Runner
uses: step-security/harden-runner@f4a75cfd619ee5ce8d5b864b0d183aff3c69b55a # v2.13.1
with:
disable-sudo: false
egress-policy: audit
allowed-endpoints: >
builds.hex.pm:443
github.com:443
repo.hex.pm:443
sobelow.io:443
- uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
- id: run-action
uses: sobelow/action@a9bf221c4eef7e7a4486fa1f06257511c9780b46
continue-on-error: true