Skip to content

Add dependency vulnerability scanning to CI pipeline#3388

Merged
olgahaha merged 5 commits intomainfrom
copilot/add-dependency-vulnerability-scanning
Apr 16, 2026
Merged

Add dependency vulnerability scanning to CI pipeline#3388
olgahaha merged 5 commits intomainfrom
copilot/add-dependency-vulnerability-scanning

Conversation

Copy link
Copy Markdown
Contributor

Copilot AI commented Mar 18, 2026

No vulnerability scanning existed in CI — npm audit, Snyk, and Dependabot auto-grouping were all absent, leaving 80+ dependencies (Web3, Capacitor, crypto libs) unscanned. Dependabot was on a monthly cadence with a cap of 5 PRs, leading to a growing backlog.

Changes

  • test.yml — New security-audit job runs on every push:

    - name: Security audit
      run: npm audit --audit-level=high --omit=dev

    Scoped to production deps only; permissions: contents: read enforced.

  • security-audit.yml — New standalone scheduled workflow running every Monday 08:00 UTC, also manually dispatchable. Workflow-level permissions: contents: read.

  • dependabot.yml — Weekly schedule (was monthly), PR limit raised 5→10, patch and minor updates grouped to reduce noise while keeping major bumps as individual PRs for manual review.

Original prompt

This section details on the original issue you should resolve

<issue_title>[Feature][High] Add dependency vulnerability scanning to CI pipeline</issue_title>
<issue_description>## Summary

The CI pipeline (.github/workflows/test.yml) runs lint and unit tests but does not include any dependency vulnerability scanning. With 80+ direct dependencies including security-sensitive packages (Web3, Capacitor plugins, crypto libraries), undetected vulnerable dependencies pose a significant supply chain risk.

Evidence

Impact

  • Vulnerable dependencies may ship to production undetected
  • Stale Dependabot PRs accumulate, increasing the effort to catch up
  • Major version dependency drift increases the risk of breaking changes when finally updated

Suggested Approach

  1. Add npm audit --audit-level=high step to the test workflow:
- name: Security audit
  run: npm audit --audit-level=high --omit=dev
  1. Configure Dependabot auto-merge for patch updates via .github/dependabot.yml
  2. Consider adding a scheduled weekly security scan workflow
  3. Prioritize reviewing the 8 pending Dependabot PRs, especially the major version bumps

Related

Generated by Health Monitor with Omni</issue_description>

Comments on the Issue (you are @copilot in this section)


✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.

Co-authored-by: numbers-official <181934381+numbers-official@users.noreply.github.com>
Copilot AI changed the title [WIP] [Feature] Add dependency vulnerability scanning to CI pipeline Add dependency vulnerability scanning to CI pipeline Mar 18, 2026
Copilot AI requested a review from numbers-official March 18, 2026 16:13
@olgahaha olgahaha marked this pull request as ready for review April 16, 2026 03:53
olgahaha and others added 3 commits April 16, 2026 11:55
npm audit --audit-level=high --omit=dev currently fails due to 14 high
severity vulnerabilities in Angular core dependencies that require a
major version upgrade. Keeping it in test.yml would block all PRs.

The standalone security-audit.yml (weekly schedule + manual dispatch)
remains for ongoing monitoring without blocking development.
@olgahaha olgahaha merged commit 66a9283 into main Apr 16, 2026
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Feature][High] Add dependency vulnerability scanning to CI pipeline

3 participants