-
Notifications
You must be signed in to change notification settings - Fork 1
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Problem
The CI pipeline has no security scanning. Known vulnerabilities in dependencies go undetected, and there is no static analysis for common security issues (XSS, injection, etc.) in the codebase.
Scope of Work
1. Add npm audit step to existing CI workflow
Add a step to .github/workflows/ci.yml after npm ci:
- name: Security audit
run: npm audit --audit-level=highThis fails the build if any high or critical vulnerabilities are found.
2. Add CodeQL analysis workflow
Create .github/workflows/codeql.yml:
- Trigger on push to main, PRs to main, and weekly schedule (for new CVE detection)
- Language:
javascript-typescript - Use
github/codeql-action/init,github/codeql-action/autobuild,github/codeql-action/analyze
Acceptance Criteria
-
npm audit --audit-level=highruns in CI and fails on high/critical vulnerabilities -
.github/workflows/codeql.ymlexists and runs successfully - CodeQL results appear in the repository's Security tab
- Both checks pass on the current main branch (fix any existing audit issues first if needed)
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request