Skip to content

CodeQL Scan

CodeQL Scan #422

name: "CodeQL Scan"
on:
push:
branches:
- main
schedule:
- cron: '30 23 * * 5'
permissions:
contents: read
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
contents: read
security-events: write
strategy:
fail-fast: false
matrix:
language:
- 'python'
steps:
- name: Harden Runner
uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142 # v2.7.0
with:
disable-sudo: true
egress-policy: block
allowed-endpoints: >
api.github.com:443
files.pythonhosted.org:443
github.com:443
objects.githubusercontent.com:443
pypi.org:443
uploads.github.com:443
- name: Checkout repository
uses: actions/[email protected]
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@codeql-bundle-20230524
with:
languages: ${{ matrix.language }}
- name: Autobuild
uses: github/codeql-action/autobuild@codeql-bundle-20230524
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@codeql-bundle-20230524