Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
name: Dependency Review
name: Dependency Review - License/Vulns

###
# This workflow analyzes dependencies introduced by pull requests to help identify security vulnerabilities
Expand All @@ -8,9 +8,9 @@ name: Dependency Review
# The default preset is "license-deny-vulnerability-high". This preset has this behavior:
#
# Fail if a dependency is found with a license that is in the deny_licenses list and fails if vulnerabilities are found in the
# dependency tree with specified severity or greater.
# dependency tree with a high severity or greater.
#
# To set the DEPENDENCY_REVIEW_CONFIG_PRESET repo variable using the gh cli, see:
# To override the config preset, set the DEPENDENCY_REVIEW_CONFIG_PRESET repo variable using the gh cli:
# gh variable set DEPENDENCY_REVIEW_CONFIG_PRESET --body "license-deny-vulnerability-high"
###

Expand All @@ -21,8 +21,8 @@ on:
permissions: {}

jobs:
dependency-review:
name: Review Dependencies
license-and-vulnerabilities:
name: License and Vulnerabilities
permissions:
contents: read
runs-on: ubuntu-latest
Expand Down
35 changes: 35 additions & 0 deletions .github/workflows/dependency-review-vulnerability.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
name: Dependency Review - Vulnerability

###
# This workflow analyzes dependencies introduced by pull requests to help identify security vulnerabilities.
#
# To override the default configuration preset, set the `DEPENDENCY_REVIEW_CONFIG_PRESET` variable in the repository settings.
# The default preset is "vulnerability-high". This preset has this behavior:
#
# Fail if a dependency is found in the dependency tree with a high severity or greater.
###

on:
merge_group:
pull_request:

permissions: {}

jobs:
vulnerability:
name: Vulnerabilities
permissions:
contents: read
runs-on: ubuntu-latest
# Skip on merge group events
if: ${{ github.event_name == 'pull_request' }}
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
persist-credentials: false

- name: Dependency Review
uses: smartcontractkit/.github/actions/dependency-review@dependency-review/v2
with:
config-preset: vulnerability-high