Skip to content

Add Scorecard workflow for supply-chain security analysis#122

Merged
mitchelsellers merged 1 commit intodevelopfrom
feature/scorecard
Mar 19, 2026
Merged

Add Scorecard workflow for supply-chain security analysis#122
mitchelsellers merged 1 commit intodevelopfrom
feature/scorecard

Conversation

@mitchelsellers
Copy link
Copy Markdown
Contributor

No description provided.

Copilot AI review requested due to automatic review settings March 19, 2026 13:32
Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Adds an OpenSSF Scorecard GitHub Actions workflow to run supply-chain security analysis and publish SARIF results for GitHub code scanning.

Changes:

  • Introduces a new ossf-scorecard workflow triggered by branch protection rule events, a weekly schedule, and pushes to develop.
  • Runs OSSF Scorecard analysis and outputs results as SARIF.
  • Uploads SARIF both as an artifact and to GitHub Code Scanning.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Comment on lines +22 to +26
permissions:
# Needed to upload the results to code-scanning dashboard.
security-events: "write"
# Needed to publish results and get a badge (see publish_results below).
id-token: "write"
analysis:
name: "Scorecard analysis"
runs-on: "ubuntu-latest"
if: ${{ github.event.repository.default_branch == github.ref_name || github.event_name == 'pull_request' }}
@@ -0,0 +1,60 @@
name: "Scorecard supply-chain security"
@sonarqubecloud
Copy link
Copy Markdown

Quality Gate Failed Quality Gate failed

Failed conditions
C Security Rating on New Code (required ≥ A)

See analysis details on SonarQube Cloud

Catch issues before they fail your Quality Gate with our IDE extension SonarQube for IDE

branches: ["develop"]

# Declare default permissions as read only.
permissions: "read-all"

Check notice

Code scanning / SonarCloud

Read-all and Write-all permissions should not be used Low

Replace "read-all" with specific permissions (e.g., "contents: read"). See more on SonarQube Cloud
@mitchelsellers mitchelsellers merged commit 2ffb4de into develop Mar 19, 2026
7 of 8 checks passed
@mitchelsellers mitchelsellers deleted the feature/scorecard branch March 19, 2026 13:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants