Skip to content

chore(sec): run zizmor in CI#6575

Merged
CommanderStorm merged 1 commit intolouislam:masterfrom
CommanderStorm:zizmor-in-ci
Jan 3, 2026
Merged

chore(sec): run zizmor in CI#6575
CommanderStorm merged 1 commit intolouislam:masterfrom
CommanderStorm:zizmor-in-ci

Conversation

@CommanderStorm
Copy link
Copy Markdown
Collaborator

A tool to detect insecure CI configurations now and in the future.

Copilot AI review requested due to automatic review settings January 3, 2026 00:35
@github-advanced-security
Copy link
Copy Markdown

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds the zizmor security scanning tool to the CodeQL workflow to detect insecure CI configurations in GitHub Actions workflows.

Key Changes

  • Added a new zizmor job to the CodeQL workflow that runs the zizmorcore/zizmor-action (v0.3.0)
  • Configured appropriate permissions for the security scanning job (security-events: write, contents: read, actions: read)
  • Applied security best practices with persist-credentials: false on checkout

Comment on lines +45 to +55
runs-on: ubuntu-latest
permissions:
security-events: write
contents: read
actions: read
steps:
- name: Checkout repository
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
with: { persist-credentials: false }
- name: Run zizmor
uses: zizmorcore/zizmor-action@e639db99335bc9038abc0e066dfcd72e23d26fb4 # v0.3.0
Copy link

Copilot AI Jan 3, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The indentation of the zizmor job properties is inconsistent with the rest of the file. The job name "zizmor" is correctly indented with 2 spaces, but the properties underneath (runs-on, permissions, steps) are indented with 6 spaces instead of 4 spaces. This should match the indentation pattern used in the "analyze" job above, where properties are indented with 4 spaces relative to the job name.

Suggested change
runs-on: ubuntu-latest
permissions:
security-events: write
contents: read
actions: read
steps:
- name: Checkout repository
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
with: { persist-credentials: false }
- name: Run zizmor
uses: zizmorcore/zizmor-action@e639db99335bc9038abc0e066dfcd72e23d26fb4 # v0.3.0
runs-on: ubuntu-latest
permissions:
security-events: write
contents: read
actions: read
steps:
- name: Checkout repository
uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1
with: { persist-credentials: false }
- name: Run zizmor
uses: zizmorcore/zizmor-action@e639db99335bc9038abc0e066dfcd72e23d26fb4 # v0.3.0

Copilot uses AI. Check for mistakes.
@CommanderStorm CommanderStorm merged commit b848f58 into louislam:master Jan 3, 2026
27 checks passed
@CommanderStorm CommanderStorm added this to the 2.1.0 milestone Jan 3, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants