Skip to content

Add osv-scanner dependency vulnerability scanning workflow#1

Draft
livenson wants to merge 1 commit intomainfrom
feature/add-vulnerability-scanning
Draft

Add osv-scanner dependency vulnerability scanning workflow#1
livenson wants to merge 1 commit intomainfrom
feature/add-vulnerability-scanning

Conversation

@livenson
Copy link
Copy Markdown
Contributor

@livenson livenson commented Apr 6, 2026

Summary

  • Adds a GitHub Actions workflow that scans package-lock.json for known CVEs using Google's osv-scanner
  • Runs on PRs, pushes to main, and weekly (Monday 06:00 UTC)
  • Non-blocking (continue-on-error: true) for gradual rollout

Test plan

  • Verify the workflow runs on this PR
  • Review osv-scanner output for any findings
  • Add .osv-scanner.toml to suppress false positives if needed

Adds a GitHub Actions workflow that scans package-lock.json for known
CVEs using Google's osv-scanner. Runs on PRs, pushes to main, and
weekly (Monday 06:00 UTC). Starts non-blocking (continue-on-error: true).
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant