Skip to content

Bump step-security/harden-runner from 2.13.1 to 2.13.2 #8

Bump step-security/harden-runner from 2.13.1 to 2.13.2

Bump step-security/harden-runner from 2.13.1 to 2.13.2 #8

Workflow file for this run

name: "CodeQL"
on:
push:
branches: [ main ]
pull_request:
branches: [ main ]
paths:
- '.github/workflows/codeql.yml'
- 'src/**'
- 'scripts/**'
- 'package.json'
- 'package-lock.json'
- 'yarn.lock'
- '!**/*.md'
permissions:
contents: read
concurrency:
group: ${{ github.workflow }}-${{ github.ref }}
cancel-in-progress: true
jobs:
analyze:
name: Analyze
runs-on: ubuntu-latest
permissions:
actions: read
checks: write
contents: read
security-events: write
steps:
- name: Harden the runner (Audit all outbound calls)
uses: step-security/harden-runner@95d9a5deda9de15063e7595e9719c11c38c90ae2 # v2.13.2
with:
egress-policy: audit
- name: Checkout
id: checkout
uses: actions/checkout@08eba0b27e820071cde6df949e0beb9ba4906955 # v4.3.0
- name: Initialize CodeQL
id: initialize
uses: github/codeql-action/init@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.29.5
with:
queries: security-extended
languages: TypeScript
source-root: src
- name: Autobuild
id: autobuild
uses: github/codeql-action/autobuild@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.29.5
- name: Perform CodeQL Analysis
id: analyze
uses: github/codeql-action/analyze@64d10c13136e1c5bce3e5fbde8d4906eeaafc885 # v3.29.5