+1
-1
.github/workflows/cifuzz.yml
+1
-1
.github/workflows/cifuzz.yml
+2
-2
.github/workflows/codeql.yml
+2
-2
.github/workflows/codeql.yml
···
32
33
# Initializes the CodeQL tools for scanning.
34
- name: Initialize CodeQL
35
-
uses: github/codeql-action/init@b2e6519679e446e7bb7c3466d70f13a6b5461fcd # v2.22.11
36
with:
37
languages: ${{ matrix.language }}
38
# xref: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
···
43
run: go build ./...
44
45
- name: Perform CodeQL Analysis
46
-
uses: github/codeql-action/analyze@b2e6519679e446e7bb7c3466d70f13a6b5461fcd # v2.22.11
47
with:
48
category: "/language:${{matrix.language}}"
···
32
33
# Initializes the CodeQL tools for scanning.
34
- name: Initialize CodeQL
35
+
uses: github/codeql-action/init@f15aac3db1ec04fd9a69b2b3904f28e913b50c78 # v2.22.11
36
with:
37
languages: ${{ matrix.language }}
38
# xref: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
···
43
run: go build ./...
44
45
- name: Perform CodeQL Analysis
46
+
uses: github/codeql-action/analyze@f15aac3db1ec04fd9a69b2b3904f28e913b50c78 # v2.22.11
47
with:
48
category: "/language:${{matrix.language}}"