Skip to content

[comp] Production Deploy#2644

Open
github-actions[bot] wants to merge 5 commits intoreleasefrom
main
Open

[comp] Production Deploy#2644
github-actions[bot] wants to merge 5 commits intoreleasefrom
main

Conversation

@github-actions
Copy link
Copy Markdown
Contributor

@github-actions github-actions Bot commented Apr 23, 2026

This is an automated pull request to release the candidate branch into production, which will trigger a deployment.
It was created by the [Production PR] action.


Summary by cubic

Update the Dependabot check to fail only when a repo has open alerts at or above a configurable severity threshold (default: high). Also show the evidence block for failed automation runs in the Compliance task UI.

  • New Features

    • Configurable alert_severity_threshold (default high) to control when the check fails.
    • Added severity helpers (dependabot-alert-severity.ts) and unit tests.
  • Bug Fixes

    • Correct gating: repos with open alerts at/above the threshold now fail, using the highest present severity.
    • Safe fallback: if alert data can’t be fetched, enabled repos still pass.
    • UI: show “View Evidence” for failed findings in Task → Integration Checks.

Written for commit 0a77112. Summary will update on new commits.

github-actions Bot and others added 3 commits April 22, 2026 22:39
…l alerts

The GitHub "Dependabot Security Updates Enabled" check previously passed
whenever Dependabot was enabled on a repo, even when open high- or
critical-severity alerts were waiting — hiding a real compliance risk
behind a green checkmark.

It now:
- Accepts an `alert_severity_threshold` variable (default: `high`) so CX
  can configure what counts as a failure per connection.
- Fails the check for the repo when open alerts at or above the threshold
  exist, using the highest actual severity present as the finding
  severity, and pointing the user at the repo's /security/dependabot page
  for remediation.
- Preserves the transparent fallback when alert data cannot be fetched
  (e.g. 403) — no alert signal means no pass/fail regression.

Severity helpers split into `dependabot-alert-severity.ts` for focused
unit testing; the main check stays a single-responsibility orchestrator.
fix(integration-platform): fail Dependabot check on open high/critical alerts
@vercel
Copy link
Copy Markdown

vercel Bot commented Apr 23, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
app (staging) Ready Ready Preview, Comment Apr 23, 2026 3:11am
comp-framework-editor Ready Ready Preview, Comment Apr 23, 2026 3:11am
1 Skipped Deployment
Project Deployment Actions Updated (UTC)
portal (staging) Skipped Skipped Apr 23, 2026 3:11am

Request Review

Copy link
Copy Markdown
Contributor

@cubic-dev-ai cubic-dev-ai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No issues found across 4 files

Requires human review: This PR modifies the core business logic of a compliance check (Dependabot), changing pass/fail criteria. Such logic changes require human review to confirm policy alignment.

tofikwest and others added 2 commits April 22, 2026 23:01
The automation-run detail card in Compliance → Task → Integration Checks
rendered a "View Evidence" expandable JSON tree for every *passing*
result but never for a *failing* one — even though the backend saves the
same `evidence` payload for both and the API returns it identically.

After the Dependabot severity-gating change (#2643), failing runs
surface useful context in their evidence (open_by_severity breakdown,
checked_at, etc.) that users need to understand *why* the check failed.
Hiding it behind a UI inconsistency defeats that.

Mirror the passing block's `details > EvidenceJsonView` pattern onto the
findings map so both states render identically.
fix(app): show evidence block for failed automation runs
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant