diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index 5f921b2..61f17c7 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -43,7 +43,7 @@ jobs: - name: Checkout repository uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1 - name: Initialize CodeQL - uses: github/codeql-action/init@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/init@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7 with: languages: ${{ matrix.language }} build-mode: ${{ matrix.build-mode }} @@ -57,6 +57,6 @@ jobs: echo ' make release' exit 1 - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/analyze@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7 with: category: "/language:${{matrix.language}}" diff --git a/.github/workflows/powershell-analyzer.yml b/.github/workflows/powershell-analyzer.yml index 95d71fc..faf9b20 100644 --- a/.github/workflows/powershell-analyzer.yml +++ b/.github/workflows/powershell-analyzer.yml @@ -31,7 +31,7 @@ jobs: output: results.sarif - name: "Upload to code-scanning" if: ${{ hashFiles('**/results.sarif') != '' }} - uses: github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/upload-sarif@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7 with: sarif_file: results.sarif category: "powershell" diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index 6551469..5215d1a 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -43,7 +43,7 @@ jobs: retention-days: 5 - name: "Upload to code-scanning" if: ${{ hashFiles('**/results.sarif') != '' }} - uses: github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/upload-sarif@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7 with: sarif_file: results.sarif category: "scorecard" diff --git a/.github/workflows/snyk-code-scan-python.yml b/.github/workflows/snyk-code-scan-python.yml index c83e1b8..8d1a9ba 100644 --- a/.github/workflows/snyk-code-scan-python.yml +++ b/.github/workflows/snyk-code-scan-python.yml @@ -45,7 +45,7 @@ jobs: continue-on-error: true # To make sure that SARIF upload gets called even if there are vulnerabilities - name: Upload result to GitHub Code Scanning if: ${{ hashFiles('**/snyk.sarif') != '' }} - uses: github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/upload-sarif@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7 with: sarif_file: snyk.sarif category: "snyk-python" diff --git a/.github/workflows/snyk-container-scan.yml b/.github/workflows/snyk-container-scan.yml index 5928116..d56ce6c 100644 --- a/.github/workflows/snyk-container-scan.yml +++ b/.github/workflows/snyk-container-scan.yml @@ -86,7 +86,7 @@ jobs: snyk container sbom $IMG --file=${{ env.wrk_dir }}/Dockerfile --format=cyclonedx1.4+json > sbom.json - name: Upload result to GitHub Code Scanning if: ${{ hashFiles('**/snyk.sarif') != '' }} - uses: github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/upload-sarif@cf1bb45a277cb3c205638b2cd5c984db1c46a412 # v4.31.7 with: sarif_file: snyk.sarif category: "snyk-container"