diff --git a/.github/workflows/codeql.yml b/.github/workflows/codeql.yml index 5f921b2..c163981 100644 --- a/.github/workflows/codeql.yml +++ b/.github/workflows/codeql.yml @@ -43,7 +43,7 @@ jobs: - name: Checkout repository uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1 - name: Initialize CodeQL - uses: github/codeql-action/init@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/init@1b168cd39490f61582a9beae412bb7057a6b2c4e # v4.31.8 with: languages: ${{ matrix.language }} build-mode: ${{ matrix.build-mode }} @@ -57,6 +57,6 @@ jobs: echo ' make release' exit 1 - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/analyze@1b168cd39490f61582a9beae412bb7057a6b2c4e # v4.31.8 with: category: "/language:${{matrix.language}}" diff --git a/.github/workflows/powershell-analyzer.yml b/.github/workflows/powershell-analyzer.yml index 95d71fc..3e586ef 100644 --- a/.github/workflows/powershell-analyzer.yml +++ b/.github/workflows/powershell-analyzer.yml @@ -31,7 +31,7 @@ jobs: output: results.sarif - name: "Upload to code-scanning" if: ${{ hashFiles('**/results.sarif') != '' }} - uses: github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/upload-sarif@1b168cd39490f61582a9beae412bb7057a6b2c4e # v4.31.8 with: sarif_file: results.sarif category: "powershell" diff --git a/.github/workflows/scorecard.yml b/.github/workflows/scorecard.yml index 6551469..75d56cd 100644 --- a/.github/workflows/scorecard.yml +++ b/.github/workflows/scorecard.yml @@ -43,7 +43,7 @@ jobs: retention-days: 5 - name: "Upload to code-scanning" if: ${{ hashFiles('**/results.sarif') != '' }} - uses: github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/upload-sarif@1b168cd39490f61582a9beae412bb7057a6b2c4e # v4.31.8 with: sarif_file: results.sarif category: "scorecard" diff --git a/.github/workflows/snyk-code-scan-python.yml b/.github/workflows/snyk-code-scan-python.yml index c83e1b8..e97a871 100644 --- a/.github/workflows/snyk-code-scan-python.yml +++ b/.github/workflows/snyk-code-scan-python.yml @@ -45,7 +45,7 @@ jobs: continue-on-error: true # To make sure that SARIF upload gets called even if there are vulnerabilities - name: Upload result to GitHub Code Scanning if: ${{ hashFiles('**/snyk.sarif') != '' }} - uses: github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/upload-sarif@1b168cd39490f61582a9beae412bb7057a6b2c4e # v4.31.8 with: sarif_file: snyk.sarif category: "snyk-python" diff --git a/.github/workflows/snyk-container-scan.yml b/.github/workflows/snyk-container-scan.yml index 5928116..a6022c7 100644 --- a/.github/workflows/snyk-container-scan.yml +++ b/.github/workflows/snyk-container-scan.yml @@ -86,7 +86,7 @@ jobs: snyk container sbom $IMG --file=${{ env.wrk_dir }}/Dockerfile --format=cyclonedx1.4+json > sbom.json - name: Upload result to GitHub Code Scanning if: ${{ hashFiles('**/snyk.sarif') != '' }} - uses: github/codeql-action/upload-sarif@fe4161a26a8629af62121b670040955b330f9af2 # v4.31.6 + uses: github/codeql-action/upload-sarif@1b168cd39490f61582a9beae412bb7057a6b2c4e # v4.31.8 with: sarif_file: snyk.sarif category: "snyk-container"