Skip to content

chore(security): Implement uniform SAST, SCA, and Dependabot#83

Merged
gowthamrao merged 7 commits into
developfrom
security-vulnerability
Apr 21, 2026
Merged

chore(security): Implement uniform SAST, SCA, and Dependabot#83
gowthamrao merged 7 commits into
developfrom
security-vulnerability

Conversation

@gowthamrao
Copy link
Copy Markdown
Contributor

Automated PR to merge security templates

@github-advanced-security
Copy link
Copy Markdown

You are seeing this message because GitHub Code Scanning has recently been set up for this repository, or this pull request contains the workflow file for the Code Scanning tool.

What Enabling Code Scanning Means:

  • The 'Security' tab will display more code scanning analysis results (e.g., for the default branch).
  • Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results.
  • You will be able to see the analysis results for the pull request's branch on this overview once the scans have completed and the checks have passed.

For more information about GitHub Code Scanning, check out the documentation.

@gowthamrao gowthamrao changed the base branch from main to develop April 21, 2026 15:50
@gowthamrao gowthamrao merged commit 33ecc96 into develop Apr 21, 2026
2 checks passed
gowthamrao added a commit that referenced this pull request Apr 21, 2026
## Release Notes: Security Tooling & Pipeline Resilience

### Overview
This update stabilizes our security infrastructure by unifying our vulnerability scanning tools and resolving key pipeline bottlenecks. We've successfully migrated to TruffleHog for secret detection and implemented graceful degradation for GitHub Advanced Security to ensure smoother, more resilient CI runs.

### 🛡️ Vulnerability & Secret Scanning
* **Uniform Security Scans:** Implemented standardized CI workflows for Static Application Security Testing (SAST), Software Composition Analysis (SCA), Trivy, and Dependabot.
* **TruffleHog Migration:** Replaced Gitleaks with TruffleHog for deeper secret scanning capabilities.
* **TruffleHog Stabilization:** Fixed CI paths and resolved a critical `base/head` identical mismatch error within `security.yml` to ensure accurate pull request diffing.

### ⚙️ CI/CD & CodeQL Hardening
* **CodeQL Permissions:** Added the required `actions:read` permissions for successful `codeql upload-sarif` executions.
* **Pipeline Error Resolution:** Resolved recurring CodeQL matrix errors, fixed pathing issues, and cleared up lingering Codespell linting warnings.
* **Pipeline Resilience:** * Configured workflows to gracefully degrade GitHub Advanced Security uploads when the feature is disabled on the repository.
    * Injected `continue-on-error` limits for degradation steps to prevent non-critical scan failures from blocking deployments.

### 🛠️ Formatting Standards
* **EOF Enforcement:** Strictly enforced End of File (EOF) standards across the codebase to maintain formatting consistency.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants