advanced-security / secret-scanning-review-action

Action to detect if a secret is initially detected in a pull request
MIT License
12 stars 3 forks source link

Bump the all-actions group across 1 directory with 2 updates #27

Closed dependabot[bot] closed 3 months ago

dependabot[bot] commented 3 months ago

Bumps the all-actions group with 2 updates in the / directory: ossf/scorecard-action and actions/upload-artifact.

Updates ossf/scorecard-action from 2.3.3 to 2.4.0

Release notes

Sourced from ossf/scorecard-action's releases.

v2.4.0

What's Changed

This update bumps the Scorecard version to the v5 release. For a complete list of changes, please refer to the v5.0.0 release notes. Of special note to Scorecard Action is the Maintainer Annotation feature, which can be used to suppress some Code Scanning false positives. Alerts will not be generated for any Scorecard Check with an annotation.

Documentation

New Contributors

Full Changelog: https://github.com/ossf/scorecard-action/compare/v2.3.3...v2.4.0

Commits
  • 62b2cac bump docker tag to v2.4.0 for release (#1414)
  • c09630c lower license score alert threshold to 9 (#1411)
  • cf8594c :seedling: Bump github.com/sigstore/cosign/v2 from 2.2.4 to 2.3.0 (#1413)
  • de5fcb9 :seedling: Bump the github-actions group with 2 updates (#1412)
  • a46b90b bump scorecard to v5.0.0 release (#1410)
  • 9fc518d :seedling: Bump golang in the docker-images group (#1407)
  • a8eaa1b :seedling: Bump the github-actions group with 2 updates (#1408)
  • 873d5fd :seedling: Bump the github-actions group across 1 directory with 2 updates (#...
  • 54cc1fe :seedling: Bump the docker-images group with 2 updates (#1401)
  • 82bcb91 :seedling: Bump golang.org/x/net from 0.26.0 to 0.27.0 (#1400)
  • Additional commits viewable in compare view


Updates actions/upload-artifact from 4.3.4 to 4.3.6

Release notes

Sourced from actions/upload-artifact's releases.

v4.3.6

What's Changed

Full Changelog: https://github.com/actions/upload-artifact/compare/v4...v4.3.6

v4.3.5

What's Changed

Full Changelog: https://github.com/actions/upload-artifact/compare/v4.3.4...v4.3.5

Commits


Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore major version` will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) - `@dependabot ignore minor version` will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) - `@dependabot ignore ` will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) - `@dependabot unignore ` will remove all of the ignore conditions of the specified dependency - `@dependabot unignore ` will remove the ignore condition of the specified dependency and ignore conditions
github-actions[bot] commented 3 months ago

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

Snapshot Warnings

⚠️: No snapshots were found for the head SHA 58166078850a8fbe682b647682b3b45637209062.

Ensure that dependencies are being submitted on PR branches and consider enabling retry-on-snapshot-warnings. See the documentation for more information and troubleshooting advice.

OpenSSF Scorecard

PackageVersionScoreDetails
actions/actions/upload-artifact 834a144ee995460fba8ed112a2fc961b36a5ec5a :green_circle: 6.7
Details
CheckScoreReason
Code-Review:green_circle: 9Found 10/11 approved changesets -- score normalized to 9
Maintained:green_circle: 67 commit(s) and 1 issue activity found in the last 90 days -- score normalized to 6
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
License:green_circle: 10license file detected
Signed-Releases:warning: -1no releases found
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Packaging:warning: -1packaging workflow not detected
Binary-Artifacts:green_circle: 10no binaries found in the repo
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Pinned-Dependencies:warning: 1dependency not pinned by hash detected -- score normalized to 1
Fuzzing:warning: 0project is not fuzzed
Security-Policy:green_circle: 9security policy file detected
SAST:green_circle: 9SAST tool detected but not run on all commits
Vulnerabilities:green_circle: 100 existing vulnerabilities detected
actions/ossf/scorecard-action 62b2cac7ed8198b15735ed49ab1e5cf35480ba46 :green_circle: 8.2
Details
CheckScoreReason
Binary-Artifacts:green_circle: 10no binaries found in the repo
Branch-Protection:warning: -1internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration
CI-Tests:green_circle: 1030 out of 30 merged PRs checked by a CI test -- score normalized to 10
CII-Best-Practices:warning: 0no effort to earn an OpenSSF best practices badge detected
Code-Review:green_circle: 10all changesets reviewed
Contributors:green_circle: 1020 different organizations found -- score normalized to 10
Dangerous-Workflow:green_circle: 10no dangerous workflow patterns detected
Dependency-Update-Tool:green_circle: 10update tool detected
Fuzzing:warning: 0project is not fuzzed
License:green_circle: 10license file detected
Maintained:green_circle: 1027 commit(s) out of 30 and 0 issue activity out of 30 found in the last 90 days -- score normalized to 10
Packaging:warning: -1no published package detected
Pinned-Dependencies:green_circle: 9dependency not pinned by hash detected -- score normalized to 9
SAST:green_circle: 10SAST tool is run on all commits
Security-Policy:green_circle: 10security policy file detected
Signed-Releases:warning: -1no releases found
Token-Permissions:warning: 0detected GitHub workflow tokens with excessive permissions
Vulnerabilities:green_circle: 10no vulnerabilities detected

Scanned Manifest Files

.github/workflows/scorecard.yml
  • actions/upload-artifact@834a144ee995460fba8ed112a2fc961b36a5ec5a
  • ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46
  • actions/upload-artifact@0b2256b8c012f0828dc542b3febcab082c67f72b
  • ossf/scorecard-action@dc50aa9510b46c811795eb24b2f1ba02a914e534