Add dependency vulnerability scanning to CI pipeline#3388
Merged
Conversation
Co-authored-by: numbers-official <181934381+numbers-official@users.noreply.github.com>
Copilot
AI
changed the title
[WIP] [Feature] Add dependency vulnerability scanning to CI pipeline
Add dependency vulnerability scanning to CI pipeline
Mar 18, 2026
This was referenced Mar 23, 2026
npm audit --audit-level=high --omit=dev currently fails due to 14 high severity vulnerabilities in Angular core dependencies that require a major version upgrade. Keeping it in test.yml would block all PRs. The standalone security-audit.yml (weekly schedule + manual dispatch) remains for ongoing monitoring without blocking development.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
No vulnerability scanning existed in CI —
npm audit, Snyk, and Dependabot auto-grouping were all absent, leaving 80+ dependencies (Web3, Capacitor, crypto libs) unscanned. Dependabot was on a monthly cadence with a cap of 5 PRs, leading to a growing backlog.Changes
test.yml— Newsecurity-auditjob runs on every push:Scoped to production deps only;
permissions: contents: readenforced.security-audit.yml— New standalone scheduled workflow running every Monday 08:00 UTC, also manually dispatchable. Workflow-levelpermissions: contents: read.dependabot.yml— Weekly schedule (was monthly), PR limit raised 5→10, patch and minor updates grouped to reduce noise while keeping major bumps as individual PRs for manual review.Original prompt
✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.