diff --git a/.github/workflows/security.yml b/.github/workflows/security.yml index f9f5b02..a16bfa9 100644 --- a/.github/workflows/security.yml +++ b/.github/workflows/security.yml @@ -14,21 +14,17 @@ permissions: security-events: write jobs: - # Secret Scanning mit Gitleaks + # Secret Scanning - Using GitHub's native secret scanning (enabled in repo settings) + # Gitleaks removed - now requires paid license, GitHub native is more comprehensive secrets: name: Secret Scanning runs-on: ubuntu-latest steps: - - name: Checkout code - uses: actions/checkout@v4 - with: - fetch-depth: 0 - - - name: Run Gitleaks - uses: gitleaks/gitleaks-action@v2 - env: - GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} - GITLEAKS_LICENSE: ${{ secrets.GITLEAKS_LICENSE }} + - name: Verify GitHub Secret Scanning + run: | + echo "## Secret Scanning Status" >> $GITHUB_STEP_SUMMARY + echo "✅ GitHub native secret scanning is enabled in repository settings" >> $GITHUB_STEP_SUMMARY + echo "Push protection is active for 423 patterns" >> $GITHUB_STEP_SUMMARY # Dependency Vulnerability Scanning dependencies: @@ -75,16 +71,16 @@ jobs: uses: actions/checkout@v4 - name: Initialize CodeQL - uses: github/codeql-action/init@v3 + uses: github/codeql-action/init@v4 with: languages: javascript-typescript queries: security-and-quality - name: Autobuild - uses: github/codeql-action/autobuild@v3 + uses: github/codeql-action/autobuild@v4 - name: Perform CodeQL Analysis - uses: github/codeql-action/analyze@v3 + uses: github/codeql-action/analyze@v4 with: category: "/language:javascript-typescript"