From fd37b36fede309d1a2a832e4b9a5547d6767a8e4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?THYDU=F0=9D=95=8F=20COIN=20=F0=9F=A5=8F?= <168812086+THYDUX@users.noreply.github.com> Date: Wed, 31 Jul 2024 23:07:18 +0100 Subject: [PATCH] Create GitHub-thydux.workflow Thydux is your new crypto coin,designed for smart trading & investment. Customize your strategy,trade confidently, & watch your portfolio grow. --- .github/workflows/GitHub-thydux.workflow | 42 ++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 .github/workflows/GitHub-thydux.workflow diff --git a/.github/workflows/GitHub-thydux.workflow b/.github/workflows/GitHub-thydux.workflow new file mode 100644 index 0000000..34860cb --- /dev/null +++ b/.github/workflows/GitHub-thydux.workflow @@ -0,0 +1,42 @@ +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. + +# This workflow integrates njsscan with GitHub's Code Scanning feature +# nodejsscan is a static security code scanner that finds insecure code patterns in your Node.js applications + +name: njsscan sarif + +on: + push: + branches: [ "master" ] + pull_request: + # The branches below must be a subset of the branches above + branches: [ "master" ] + schedule: + - cron: '41 1 * * 3' + +permissions: + contents: read + +jobs: + njsscan: + permissions: + contents: read # for actions/checkout to fetch code + security-events: write # for github/codeql-action/upload-sarif to upload SARIF results + actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status + runs-on: ubuntu-latest + name: njsscan code scanning + steps: + - name: Checkout the code + uses: actions/checkout@v4 + - name: nodejsscan scan + id: njsscan + uses: ajinabraham/njsscan-action@7237412fdd36af517e2745077cedbf9d6900d711 + with: + args: '. --sarif --output results.sarif || true' + - name: Upload njsscan report + uses: github/codeql-action/upload-sarif@v3 + with: + sarif_file: results.sarif