Skip to content

codeql

codeql #739

Workflow file for this run

# Runs GitHub's semantic code analysis engine, CodeQL, against a repository's
# source code to find security vulnerabilities. It then automatically uploads
# the results to GitHub so they can be displayed in the repository's security
# tab.
name: codeql
on:
push:
branches: ['main']
paths: ['**.ts', '**.js', '**.json', '**.yml']
pull_request:
branches: ['main']
paths: ['**.ts', '**.js', '**.json', '**.yml']
types: [opened, synchronize, reopened]
schedule:
# ┌───────────── minute (0 - 59)
# │ ┌───────────── hour (0 - 23)
# │ │ ┌───────────── day of the month (1 - 31)
# │ │ │ ┌───────────── month (1 - 12 or JAN-DEC)
# │ │ │ │ ┌───────────── day of the week (0 - 6 or SUN-SAT)
# │ │ │ │ │
# │ │ │ │ │
# │ │ │ │ │
# * * * * *
- cron: '30 1 * * 0'
jobs:
codeql:
runs-on: ubuntu-latest
if: ${{ !contains(github.event.head_commit.message, '[skip codeql]') }}
permissions:
# required for all workflows
security-events: write
steps:
- name: Checkout repository
uses: actions/checkout@v3
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: javascript
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2