Skip to content

chore(deps): bump lodash from 4.17.21 to 4.17.23 #573

chore(deps): bump lodash from 4.17.21 to 4.17.23

chore(deps): bump lodash from 4.17.21 to 4.17.23 #573

Workflow file for this run

# This GitHub Actions workflow is configured to run Semgrep, a static analysis tool, on the repository.
# The workflow is triggered on the following events:
# - Manually via the workflow_dispatch event.
# - On pull requests.
# - On pushes to the 'main' and 'master' branches, specifically when changes are made to the '.github/workflows/semgrep.yml' file.
# - On a scheduled basis at 05:49 UTC every day to avoid load spikes at 00:00.
# The workflow is named "Semgrep" and requires read permissions for repository contents.
# The workflow defines a single job named "semgrep/ci" which runs on an Ubuntu 20.04 runner.
# The job uses a Docker container with the 'returntocorp/semgrep' image.
# The SEMGREP_APP_TOKEN is provided as an environment variable from the repository secrets.
# The job consists of the following steps:
# 1. Harden Runner: Uses the 'step-security/harden-runner' action to audit egress policies.
# 2. Checkout: Uses the 'actions/checkout' action to check out the repository code.
# 3. Run Semgrep: Executes the 'semgrep ci' command to run the Semgrep analysis.
on:
workflow_dispatch: {}
pull_request: {}
push:
branches:
- main
- master
paths:
- .github/workflows/semgrep.yml
schedule:
# random HH:MM to avoid a load spike on GitHub Actions at 00:00
- cron: 49 5 * * * # Chosen to avoid a load spike on GitHub Actions at 00:00
name: Semgrep
permissions:
# The 'contents: read' permission is required to allow the workflow to read the repository contents.
contents: read
concurrency:
group: semgrep-${{ github.ref }}
cancel-in-progress: false
jobs:
semgrep:
name: semgrep/ci
runs-on: ubuntu-latest
env:
SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }}
container:
image: returntocorp/semgrep
steps:
- name: Harden Runner
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
with:
egress-policy: audit
- uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
- run: semgrep ci