diff --git a/.github/workflows/codeql-analysis.yml b/.github/workflows/codeql-analysis.yml deleted file mode 100644 index e908943..0000000 --- a/.github/workflows/codeql-analysis.yml +++ /dev/null @@ -1,31 +0,0 @@ -name: "CodeQL" - -on: - # workflow_dispatch enables manual triggering of the workflow - workflow_dispatch: - schedule: - - cron: '47 6 * * 2' -env: - FAST_EMAIL: ${{ secrets.FAST_EMAIL }} - FAST_USER: ${{ secrets.FAST_USER }} - FAST_TOKEN: ${{ secrets.FAST_TOKEN }} - FAST_HTTPAUTH: ${{ secrets.FAST_HTTPAUTH }} - -jobs: - analyze: - name: Analyze - runs-on: ubuntu-latest - permissions: - actions: read - contents: read - security-events: write - - steps: - - name: S24 static application security testing (SAST) action - uses: scout24/s24-sast-action@v1 - with: - languages: java - fast_user: ${{ env.FAST_USER }} - fast_token: ${{ env.FAST_TOKEN }} - java_version: '11' - diff --git a/.github/workflows/security-analysis.yml b/.github/workflows/security-analysis.yml new file mode 100644 index 0000000..9ddf7e0 --- /dev/null +++ b/.github/workflows/security-analysis.yml @@ -0,0 +1,16 @@ +name: "Security Static Analysis" + +on: + pull_request: {} + workflow_dispatch: {} + schedule: + - cron: '16 12 1 * *' +jobs: + scan: + uses: scout24/s24-sast-action/.github/workflows/security-analysis.yml@v3 + + secrets: + GH_TOKEN: ${{ secrets.GITHUB_TOKEN }} + SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }} + GITLEAKS_LICENSE: ${{ secrets.GITLEAKS_LICENSE }} +