Security Code Scanner
Overview
The Security Code Scanner GitHub Action is designed to enhance the security of your repositories by performing thorough code scans. Currently, it utilizes the Appsec CodeQL scanner, but the scope is planned to expand to include other security actions, providing a more comprehensive security analysis.
Inputs
repo
: (Required) The name of the repository you want to scan.
Secrets
This action requires secret to be be defined in organization or repo secrets:
- MIXPANEL_PROJECT_TOKEN
- APPSEC_BOT_SLACK_WEBHOOK
How to Use
To use the Security Code Scanner, add the following steps to your workflow file:
name: Security Scan
on:
push:
branches: [main]
pull_request:
branches: [main]
jobs:
security-scan:
runs-on: ubuntu-latest
steps:
- name: Check out repo to scan
uses: actions/checkout@v4
with:
repository: ${{ github.repository }}
- name: Security Code Scanner
uses: <your-username>/Security-Code-Scanner@v1
with:
repo: ${{ github.repository }}
paths_ignored: ${{ github.event.inputs.paths_ignored || env.DEFAULT_PATHS_IGNORED }}
rules_excluded: ${{ github.event.inputs.rules_excluded || env.DEFAULT_RULES_EXCLUDED }}
mixpanel_project_token: ${{secrets.APPSEC_MIXPANEL_PROJECT_TOKEN}}
slack_webhook: ${{secrets.APPSEC_SLACK_WEBHOOK}}
Replace `<your-username>` with your GitHub username or organization name where the action is hosted.
## Features
- **CodeQL Analysis**: Leverages the robust CodeQL scanning tool from MetaMask/Appsec-CodeQL to identify vulnerabilities in the codebase.
## Future Plans
The action is in its initial phase, and we plan to integrate additional security scanning tools to widen our security coverage.