Open-CMSIS-Pack / cbuild2cmake

A command line tool that generates CMakeLists.txt file from *.cbuild.yml files generated by csolution
Apache License 2.0
3 stars 2 forks source link

Bump golang/govulncheck-action from 1.0.2 to 1.0.3 #132

Closed dependabot[bot] closed 1 month ago

dependabot[bot] commented 1 month ago

Bumps golang/govulncheck-action from 1.0.2 to 1.0.3.

Release notes

Sourced from golang/govulncheck-action's releases.

v1.0.3

Add inputs for specifying the output format and optional output file. This can be used, for instance, to save govulncheck SARIF output to a file that users can then upload to Github code scanning.

Commits


Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
github-actions[bot] commented 1 month ago

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails
actions/golang/govulncheck-action dd0578b371c987f96d1185abb54344b44352bd58 :green_circle: 4.2
Details
CheckScoreReason
Maintained:warning: 01 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Code-Review:green_circle: 9Found 12/13 approved changesets -- score normalized to 9
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Dangerous-Workflow:warning: -1no workflows found
Pinned-Dependencies:warning: -1no dependencies found
SAST:warning: 0no SAST tool detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Packaging:warning: -1packaging workflow not detected
Token-Permissions:warning: -1No tokens found
Branch-Protection:warning: 0branch protection not enabled on development/release branches
Fuzzing:warning: 0project is not fuzzed
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
Security-Policy:warning: 0security policy file not detected
actions/golang/govulncheck-action 3a32958c2706f7048305d5a2e53633d7e37e97d0 :green_circle: 4.2
Details
CheckScoreReason
Maintained:warning: 01 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Code-Review:green_circle: 9Found 12/13 approved changesets -- score normalized to 9
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Dangerous-Workflow:warning: -1no workflows found
Pinned-Dependencies:warning: -1no dependencies found
SAST:warning: 0no SAST tool detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Packaging:warning: -1packaging workflow not detected
Token-Permissions:warning: -1No tokens found
Branch-Protection:warning: 0branch protection not enabled on development/release branches
Fuzzing:warning: 0project is not fuzzed
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
Security-Policy:warning: 0security policy file not detected

Scanned Manifest Files

.github/workflows/test.yml
  • golang/govulncheck-action@dd0578b371c987f96d1185abb54344b44352bd58
  • golang/govulncheck-action@3a32958c2706f7048305d5a2e53633d7e37e97d0
github-actions[bot] commented 1 month ago

Test Results

  4 files  ±0   20 suites  ±0   1s :stopwatch: ±0s  64 tests ±0   64 :white_check_mark: ±0  0 :zzz: ±0  0 :x: ±0  256 runs  ±0  256 :white_check_mark: ±0  0 :zzz: ±0  0 :x: ±0 

Results for commit f24478fe. ± Comparison against base commit 35a63e3f.

codeclimate[bot] commented 1 month ago

Code Climate has analyzed commit f24478fe and detected 0 issues on this pull request.

The test coverage on the diff in this pull request is 100.0% (50% is the threshold).

This pull request will bring the total coverage in the repository to 87.7% (0.0% change).

View more on Code Climate.