chore(deps): bump postcss from 8.5.8 to 8.5.10 in /frontend #139
Workflow file for this run
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| name: Security | |
| on: | |
| push: | |
| branches: [main, develop] | |
| pull_request: | |
| branches: [main] | |
| schedule: | |
| # Run weekly on Monday at 08:00 UTC | |
| - cron: "0 8 * * 1" | |
| permissions: | |
| contents: read | |
| jobs: | |
| detect-secrets: | |
| name: Detect Secrets | |
| runs-on: ubuntu-latest | |
| steps: | |
| - uses: actions/checkout@v4 | |
| with: | |
| fetch-depth: 0 | |
| - uses: actions/setup-python@v5 | |
| with: | |
| python-version: "3.12" | |
| - name: Install detect-secrets | |
| run: pip install detect-secrets | |
| - name: Scan for secrets | |
| run: | | |
| detect-secrets scan \ | |
| --baseline .secrets.baseline \ | |
| --exclude-files '.*\.lock$' \ | |
| --exclude-files '.*\.tfstate.*' \ | |
| --exclude-files 'uv\.lock' \ | |
| --exclude-files 'pnpm-lock\.yaml' \ | |
| --exclude-files 'package-lock\.json' | |
| dependency-audit-python: | |
| name: Python Dependency Audit | |
| runs-on: ubuntu-latest | |
| steps: | |
| - uses: actions/checkout@v4 | |
| - uses: astral-sh/setup-uv@v4 | |
| - name: Audit with pip-audit | |
| run: | | |
| uv export --no-dev --format requirements-txt | \ | |
| uvx pip-audit -r /dev/stdin \ | |
| --ignore-vuln CVE-2024-23342 \ | |
| --ignore-vuln CVE-2026-4539 \ | |
| --ignore-vuln CVE-2026-34073 \ | |
| --ignore-vuln CVE-2026-33936 | |
| dependency-audit-node: | |
| name: Node Dependency Audit | |
| runs-on: ubuntu-latest | |
| steps: | |
| - uses: actions/checkout@v4 | |
| - uses: actions/setup-node@v4 | |
| with: | |
| node-version: "22" | |
| - name: Install dependencies | |
| run: npm ci | |
| working-directory: frontend | |
| - name: Audit | |
| run: npm audit --audit-level=high | |
| working-directory: frontend | |
| continue-on-error: true | |
| terraform-security: | |
| name: Terraform Security Scan | |
| runs-on: ubuntu-latest | |
| steps: | |
| - uses: actions/checkout@v4 | |
| - name: Run tfsec | |
| uses: aquasecurity/tfsec-action@v1.0.3 | |
| with: | |
| working_directory: iac | |
| soft_fail: true | |
| - name: Run trivy on IaC | |
| uses: aquasecurity/trivy-action@master | |
| with: | |
| scan-type: config | |
| scan-ref: iac | |
| exit-code: "0" | |
| severity: HIGH,CRITICAL |