Skip to content

Enable dependency scanning with Dependabot #11

@ChrisJBurns

Description

@ChrisJBurns

Summary

Enable Dependabot to automatically scan dependencies for known vulnerabilities and create PRs for updates.

Background

From the security threat model (T7: Supply Chain - Dependency Compromise), dependencies like go-github, go-yaml, and helm-docs could be compromised. Automated scanning helps detect known vulnerabilities quickly.

Acceptance Criteria

  • Add .github/dependabot.yml configuration
  • Enable scanning for Go modules
  • Enable scanning for GitHub Actions
  • Configure appropriate update schedule (weekly recommended)
  • Consider grouping minor/patch updates to reduce PR noise

Example Configuration

version: 2
updates:
  - package-ecosystem: "gomod"
    directory: "/"
    schedule:
      interval: "weekly"
    groups:
      minor-and-patch:
        patterns:
          - "*"
        update-types:
          - "minor"
          - "patch"

  - package-ecosystem: "github-actions"
    directory: "/"
    schedule:
      interval: "weekly"

Priority

Medium - Supply chain security

Related

  • SECURITY.md threat model (T7)

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or requestsecuritySecurity-related improvements

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions