Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 10 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
version: 2
updates:
- package-ecosystem: "npm"
directory: "/"
schedule:
interval: "weekly"
labels:
- "dependencies"
- "security"
open-pull-requests-limit: 10
38 changes: 21 additions & 17 deletions .github/workflows/security.yml
Original file line number Diff line number Diff line change
@@ -1,29 +1,33 @@
name: Security Compliance

# Default permissions: grant the workflow the minimal elevated permissions needed
# for signing and uploading provenance when enabled. Callers running this
# workflow will grant these permissions in their repo; remove or restrict
# these if you do not want to allow write operations from the workflow.
permissions:
id-token: write
security-events: write
contents: write
packages: write

on:
push:
branches: [main, master]
branches: [main, develop]
pull_request:
workflow_dispatch: # Allow manual trigger for testing
schedule:
- cron: '0 0 * * 0' # Weekly scan

jobs:
# Call your security compliance hub
security-scan:
security:
uses: acald-creator/security-compliance-hub/.github/workflows/security-scan.yml@main
with:
severity-threshold: MEDIUM
compliance-frameworks: openssf
enable-signing: false # Start with false for testing
permissions:
contents: read
security-events: write
id-token: write
actions: read
severity-threshold: HIGH
compliance-frameworks: openssf,owasp,slsa
enable-signing: true
secrets: inherit

# Call the DevSecOps workflow
devsecops-check:
devsecops:
uses: acald-creator/security-compliance-hub/.github/workflows/devsecops-infinity.yml@main
with:
phase: plan # Just test one phase first
permissions:
contents: read
phase: all
secrets: inherit