1+ name : Scorecard supply-chain security
2+ on :
3+ # For Branch-Protection check. Only the default branch is supported. See
4+ # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection
5+ branch_protection_rule :
6+ # To guarantee Maintained check is occasionally updated. See
7+ # https://github.com/ossf/scorecard/blob/main/docs/checks.md#maintained
8+ schedule :
9+ - cron : ' 20 7 * * 2'
10+ push :
11+ branches : ["main"]
12+
13+ # Declare default permissions as read only.
14+ permissions : read-all
15+
16+ jobs :
17+ analysis :
18+ name : Scorecard analysis
19+ runs-on : ubuntu-latest
20+ permissions :
21+ # Needed to upload the results to code-scanning dashboard.
22+ security-events : write
23+ # Needed to publish results and get a badge (see publish_results below).
24+ id-token : write
25+ contents : read
26+ actions : read
27+ # To allow GraphQL ListCommits to work
28+ issues : read
29+ pull-requests : read
30+ # To detect SAST tools
31+ checks : read
32+
33+ steps :
34+
35+ - name : " Checkout code"
36+ uses : actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4.3.0
37+ with :
38+ persist-credentials : false
39+
40+ - name : " Run analysis"
41+ uses : ossf/scorecard-action@62b2cac7ed8198b15735ed49ab1e5cf35480ba46 # v2.4.0
42+ with :
43+ results_file : results.sarif
44+ results_format : sarif
45+ # (Optional) "write" PAT token. Uncomment the `repo_token` line below if:
46+ # - you want to enable the Branch-Protection check on a *public* repository, or
47+ # - you are installing Scorecards on a *private* repository
48+ # To create the PAT, follow the steps in https://github.com/ossf/scorecard-action#authentication-with-pat.
49+ # repo_token: ${{ secrets.SCORECARD_TOKEN }}
50+
51+ # Public repositories:
52+ # - Publish results to OpenSSF REST API for easy access by consumers
53+ # - Allows the repository to include the Scorecard badge.
54+ # - See https://github.com/ossf/scorecard-action#publishing-results.
55+ # For private repositories:
56+ # - `publish_results` will always be set to `false`, regardless
57+ # of the value entered here.
58+ publish_results : true
59+
60+ # Upload the results as artifacts (optional). Commenting out will disable uploads of run results in SARIF
61+ # format to the repository Actions tab.
62+ - name : " Upload artifact"
63+ uses : actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
64+ with :
65+ name : SARIF file
66+ path : results.sarif
67+ retention-days : 5
68+
69+ # Upload the results to GitHub's code scanning dashboard.
70+ - name : " Upload to code-scanning"
71+ uses : github/codeql-action/upload-sarif@2d92b76c45b91eb80fc44c74ce3fce0ee94e8f9d # v3.30.0
72+ with :
73+ sarif_file : results.sarif
0 commit comments