Standardize security workflow and enhance CodeQL analysis (#479)
* fix(workflows): standardize runner configuration for security jobs * ci(actionlint): add Blacksmith runner label to config Add blacksmith-2vcpu-ubuntu-2404 to actionlint self-hosted-runner labels config to suppress "unknown label" warnings during workflow linting. This label is used across all workflows after the Blacksmith migration. * fix(actionlint): adjust indentation for self-hosted runner labels * feat(security): enhance security workflow with CodeQL analysis steps * fix(security): update CodeQL action to version 4 for improved analysis * fix(security): remove duplicate permissions in security workflow * fix(security): revert CodeQL action to v3 for stability The v4 version was causing workflow file validation failures. Reverting to proven v3 version that is working on main branch. * fix(security): remove duplicate permissions causing workflow validation failure The permissions block had duplicate security-events and actions keys, which caused YAML validation errors and prevented workflow execution. Fixes: workflow file validation failures on main branch * fix(security): remove pull_request trigger to reduce costs * fix(security): restore PR trigger but skip codeql on PRs * fix(security): resolve YAML syntax error in security workflow * refactor(security): split CodeQL into dedicated scheduled workflow * fix(security): update workflow name to Rust Package Security Audit * fix(codeql): remove push trigger, keep schedule and on-demand only * feat(codeql): add CodeQL configuration file to ignore specific paths
This commit is contained in:
parent
1e6f386a97
commit
c4564ed4ca
2 changed files with 9 additions and 0 deletions
8
.github/codeql/codeql-config.yml
vendored
Normal file
8
.github/codeql/codeql-config.yml
vendored
Normal file
|
|
@ -0,0 +1,8 @@
|
|||
# CodeQL configuration for ZeroClaw
|
||||
#
|
||||
# We intentionally ignore integration tests under `tests/` because they often
|
||||
# contain security-focused fixtures (example secrets, malformed payloads, etc.)
|
||||
# that can trigger false positives in security queries.
|
||||
|
||||
paths-ignore:
|
||||
- tests/**
|
||||
Loading…
Add table
Add a link
Reference in a new issue