+1
-1
.github/workflows/cifuzz.yml
+1
-1
.github/workflows/cifuzz.yml
···
33
33
path: ./out/artifacts
34
34
- name: Upload Sarif
35
35
if: always() && steps.build.outcome == 'success'
36
-
uses: github/codeql-action/upload-sarif@v3.28.11
36
+
uses: github/codeql-action/upload-sarif@v3.28.13
37
37
with:
38
38
# Path to SARIF file relative to the root of the repository
39
39
sarif_file: cifuzz-sarif/results.sarif
+2
-2
.github/workflows/codeql.yml
+2
-2
.github/workflows/codeql.yml
···
32
32
33
33
# Initializes the CodeQL tools for scanning.
34
34
- name: Initialize CodeQL
35
-
uses: github/codeql-action/init@b2e6519679e446e7bb7c3466d70f13a6b5461fcd # v2.22.11
35
+
uses: github/codeql-action/init@f15aac3db1ec04fd9a69b2b3904f28e913b50c78 # v2.22.11
36
36
with:
37
37
languages: ${{ matrix.language }}
38
38
# xref: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
···
43
43
run: go build ./...
44
44
45
45
- name: Perform CodeQL Analysis
46
-
uses: github/codeql-action/analyze@b2e6519679e446e7bb7c3466d70f13a6b5461fcd # v2.22.11
46
+
uses: github/codeql-action/analyze@f15aac3db1ec04fd9a69b2b3904f28e913b50c78 # v2.22.11
47
47
with:
48
48
category: "/language:${{matrix.language}}"