ci: enable CodeQL security analysis#29
Conversation
Add CodeQL workflow to scan GitHub Actions workflows for security issues. Runs on push/PR to main and weekly on Mondays. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
There was a problem hiding this comment.
Pull request overview
Adds GitHub CodeQL code scanning to improve security analysis coverage for the repository’s GitHub Actions workflows (per issue #11 item 8).
Changes:
- Introduces a new CodeQL workflow that runs on push/PR to
mainand on a weekly cron schedule. - Configures CodeQL to analyze
actions(GitHub Actions workflow files) and upload results to the Security tab.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| branches: [main] | ||
| pull_request: | ||
| branches: [main] |
There was a problem hiding this comment.
To match the YAML style used in the existing workflows (e.g., .github/workflows/ci.yml:9-11), consider using the multi-line list form for branches instead of the inline array syntax. This keeps workflow triggers consistent and easier to edit in diffs.
| branches: [main] | |
| pull_request: | |
| branches: [main] | |
| branches: | |
| - main | |
| pull_request: | |
| branches: | |
| - main |
There was a problem hiding this comment.
Addressed in the latest push.
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Automated review — APPROVEDRisk: LOW SummaryPR adds a CodeQL GitHub Actions security scanning workflow that follows best practices: top-level permissions are denied by default, the job grants only the minimum required scopes ( FindingsInfo (non-blocking)
CI status
Reviewed by the don-petry PR-review cascade (triage: haiku 4.5 → deep: sonnet 4.6 + duck: gpt-5.4 → audit: opus 4.6). Reply with |
Why?
GitHub Actions workflows can contain security vulnerabilities (script injection, overly permissive tokens, unsafe third-party actions). CodeQL's
actionslanguage analysis catches these automatically, reducing the risk of supply-chain attacks through CI configuration.Summary
.github/workflows/codeql.yml) to scan GitHub Actions workflows for security issueslanguages: actionsto analyze workflow files; Rust support can be added as CodeQL's Rust analysis maturesAddresses item 8 in #11.
Test plan
🤖 Generated with Claude Code