Skip to content

Commit 6970ca9

Browse files
committed
CI: Add vulnerability checking
1 parent efb53ed commit 6970ca9

File tree

2 files changed

+23
-4
lines changed

2 files changed

+23
-4
lines changed

.github/workflows/ci_cd.yml

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,17 @@ jobs:
4040
bot-email: ${{ secrets.PYANSYS_CI_BOT_EMAIL }}
4141
use-upper-case: true
4242

43+
vulnerabilities:
44+
name: "Vulnerabilities"
45+
runs-on: ubuntu-latest
46+
steps:
47+
- uses: ansys/actions/check-vulnerabilities@v9
48+
with:
49+
python-version: ${{ env.MAIN_PYTHON_VERSION }}
50+
python-package-name: ${{ env.PACKAGE_NAME }}
51+
token: ${{ secrets.PYANSYS_CI_BOT_TOKEN }}
52+
dev-mode: ${{ github.ref != 'refs/heads/main' }}
53+
4354
# NOTE: We do not allow dependabot to trigger the CI/CD pipeline automatically.
4455
# This is to mitigate supply chain attacks, where a malicious dependency update
4556
# could execute arbitrary code in our build environment.

SECURITY.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,17 @@ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
2222
SOFTWARE.
2323
-->
2424

25-
# Security Policy
25+
## Reporting a vulnerability
2626

27-
## Reporting a Vulnerability
27+
> [!CAUTION]
28+
> Do not use GitHub issues to report any security vulnerabilities.
2829
29-
If you detect a vulnerability, contact the [PyAnsys Core team](mailto:[email protected])
30-
mentioning the repository and the details of your finding. The team will address it as soon as possible.
30+
If you detect a vulnerability, contact the [PyAnsys Core team](mailto:[email protected]),
31+
mentioning the repository and the details of your finding. The team will address it as soon as possible.
32+
33+
Provide the PyAnsys Core team with this information:
34+
35+
- Any specific configuration settings needed to reproduce the problem
36+
- Step-by-step guidance to reproduce the problem
37+
- The exact location of the problematic source code, including tag, branch, commit, or a direct URL
38+
- The potential consequences of the vulnerability, along with a description of how an attacker could take advantage of the issue

0 commit comments

Comments
 (0)