name: Scorecard supply-chain security on: branch_protection_rule: schedule: - cron: '27 12 * * 2' push: branches: [ "main" ] permissions: read-all jobs: analysis: name: Scorecard analysis runs-on: ubuntu-latest if: github.event.repository.default_branch == github.ref_name || github.event_name == 'pull_request' permissions: security-events: write id-token: write steps: - name: "Checkout code" uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v6.0.1 with: persist-credentials: false - name: "Run analysis" uses: ossf/scorecard-action@4eaacf0543bb3f2c246792bd56e8cdeffafb205a # v2.4.3 with: results_file: results.sarif results_format: sarif publish_results: true - name: "Upload artifact" uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 with: name: SARIF file path: results.sarif retention-days: 5 - name: "Upload to code-scanning" uses: github/codeql-action/upload-sarif@3599b3baa15b485a2e49ef411a7a4bb2452e7f93 # v3.30.5 with: sarif_file: results.sarif