Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

refactor(api): add buildTransport that uses ProxyTransport #410

refactor(api): add buildTransport that uses ProxyTransport

refactor(api): add buildTransport that uses ProxyTransport #410

Workflow file for this run

name: Semgrep - SAST Scan
on:
pull_request_target:
types: [ closed, edited, opened, synchronize, ready_for_review ]
jobs:
semgrep:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
runs-on: ubuntu-latest
container:
image: returntocorp/semgrep
steps:
- uses: actions/checkout@v4
with:
ref: ${{ github.event.pull_request.head.ref }}
repository: ${{ github.event.pull_request.head.repo.full_name }}
- name: Checkout semgrep-rules repo
uses: actions/checkout@v4
with:
repository: sourcegraph/security-semgrep-rules
token: ${{ secrets.GH_SEMGREP_SAST_TOKEN }}
path: semgrep-rules
- name: Run Semgrep SAST Scan
run: |
mv semgrep-rules ../
semgrep ci -f ../semgrep-rules/semgrep-rules/ --metrics=off --oss-only --suppress-errors --sarif -o results.sarif --exclude='semgrep-rules' --baseline-commit "$(git merge-base main HEAD)" || true
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: results.sarif
Morty Proxy This is a proxified and sanitized view of the page, visit original site.