feat: add OSSF Scorecard GitHub Actions workflow#82
Conversation
…ain verification Co-authored-by: seonghobae <8172694+seonghobae@users.noreply.github.com> Agent-Logs-Url: https://github.com/seonghobae/bandscope/sessions/ba935340-dbe2-4369-bee3-5b437786b486
|
@coderabbitai review |
✅ Actions performedReview triggered.
|
|
Warning Rate limit exceeded
⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: ASSERTIVE Plan: Pro Run ID: 📒 Files selected for processing (2)
📝 WalkthroughWalkthrough
Changes
Sequence Diagram(s)sequenceDiagram
autonumber
participant Dev as Developer
participant Repo as GitHub Repo
participant Runner as Actions Runner
participant Scorecard as OSSF Scorecard
participant Artifacts as GitHub Artifacts
participant Upload as SARIF Uploader
participant Verifier as verify_supply_chain.py
Dev->>Repo: Push to `develop`/`main` or cron
Repo->>Runner: Trigger `ossf-scorecard` workflow
Runner->>Scorecard: Run ossf/scorecard-action analysis
Scorecard-->>Runner: Produce `results.sarif`
Runner->>Artifacts: Upload `results.sarif` (artifact)
Runner->>Upload: Upload SARIF to GitHub
Verifier->>Repo: Read `.github/workflows/ossf-scorecard.yml`
Verifier->>Verifier: Check tokens `develop`, `main`, `push`, `schedule`, `ossf-scorecard`
Verifier-->>Repo: Report violations if missing
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes Possibly related PRs
시
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Comment |
There was a problem hiding this comment.
Actionable comments posted: 2
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In @.github/workflows/ossf-scorecard.yml:
- Around line 3-10: The workflow currently includes an unsupported trigger
branch_protection_rule; remove that key from the workflow so only supported
triggers remain (push and schedule) and ensure the existing schedule (cron) and
push branches remain unchanged; specifically delete the branch_protection_rule
entry and keep the schedule (cron: '30 1 * * 1') and push (branches: - develop -
main) triggers so the OSSF scorecard-action runs only on supported events.
In `@scripts/checks/verify_supply_chain.py`:
- Around line 160-165: 현재 scorecard 토큰 누락을 하나씩 append하는 반복문을 list.extend 패턴으로
리팩토링해 일관성과 퍼포먼스를 개선하세요: scorecard와 token 리스트(예:
["develop","main","push","schedule","ossf-scorecard"])를 사용해 누락된 토큰들을
comprehension으로 수집한 뒤 missing.extend(...)로 한 번에 추가하도록 변경합니다; 관련 식별자: scorecard,
missing, token.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Organization UI
Review profile: ASSERTIVE
Plan: Pro
Run ID: 46fe74d5-1bf4-470c-80d6-49a884d0c83f
📒 Files selected for processing (2)
.github/workflows/ossf-scorecard.ymlscripts/checks/verify_supply_chain.py
…ecard workflow The branch_protection_rule event is not supported by the ossf/scorecard-action and causes unexpected behavior. Keep only push (develop, main) and weekly schedule. Addresses CodeRabbit review comment on PR #82.
…recard loop Replace individual append() calls in the ossf scorecard token loop with a single extend() using a generator expression, as requested in CodeRabbit review.
|
@coderabbitai review |
✅ Actions performedReview triggered.
|
✅ Actions performedReview triggered.
|
Adds OSSF Scorecard supply-chain analysis as a GitHub Actions workflow. Dependency Review already existed in the repository.
New workflow:
.github/workflows/ossf-scorecard.ymlossf/scorecard-action@v2.4.3on push todevelop/main, weekly schedule, andbranch_protection_ruleeventscodeql-action/upload-sarifpublish_results: true)permissions: read-alltop-level withsecurity-events: write+id-token: writescoped to jobSupply-chain verification update:
scripts/checks/verify_supply_chain.pyossf-scorecard.ymltoREQUIRED_FILESdevelop,main,push,schedule,ossf-scorecard)Original prompt
📍 Connect Copilot coding agent with Jira, Azure Boards or Linear to delegate work to Copilot in one click without leaving your project management tool.