Commit 275f0e3
ci: add dependency-review workflow
Adds a `QA - Dependency review` workflow that runs
`actions/dependency-review-action` on every PR targeting `main`.
This blocks PRs that introduce a *new* dependency (direct or transitive)
with a known high or critical vulnerability in GitHub's Advisory
Database. It complements rather than duplicates Dependabot: Dependabot
surfaces vulns in already-merged dependencies; dependency-review catches
them at the moment they would be introduced.
It also catches the much narrower case that motivated this PR — a
maintainer-account-hijack publishing a malicious version to npm — only
indirectly: GitHub will not have an advisory entry until the package
has been flagged. The real value here is keeping the much larger class
of "newly introduced dep happens to carry a known CVE" out of the tree.
Configured with:
- fail-on-severity: high (block on high/critical only)
- comment-summary-in-pr: on-failure (surface diff context to
reviewers when a block fires)
Pinned to v5.0.0 (a1d282b36b6f3519aa1f3fc636f609c47dddb294).
Co-authored-by: Agent <279763771+playpen-agent@users.noreply.github.com>1 parent bc3c12a commit 275f0e3
1 file changed
Lines changed: 32 additions & 0 deletions
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
| 1 | + | |
| 2 | + | |
| 3 | + | |
| 4 | + | |
| 5 | + | |
| 6 | + | |
| 7 | + | |
| 8 | + | |
| 9 | + | |
| 10 | + | |
| 11 | + | |
| 12 | + | |
| 13 | + | |
| 14 | + | |
| 15 | + | |
| 16 | + | |
| 17 | + | |
| 18 | + | |
| 19 | + | |
| 20 | + | |
| 21 | + | |
| 22 | + | |
| 23 | + | |
| 24 | + | |
| 25 | + | |
| 26 | + | |
| 27 | + | |
| 28 | + | |
| 29 | + | |
| 30 | + | |
| 31 | + | |
| 32 | + | |
0 commit comments