Skip to content

Commit

Permalink
Update docs/guides/software-lifecycle/security/security-scanning/READ…
Browse files Browse the repository at this point in the history
…ME.md

Co-authored-by: Rishi Verma <[email protected]>
  • Loading branch information
ingyhere and riverma authored Apr 25, 2024
1 parent aba86ed commit 641ff18
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ Code is scanned for security risks within the repository. It leverages [GitHub A

#### Steps
1. **Workflow Creation**
- The first step is to create a `codeql.yaml` workflow file in the `.github/workflows` directory to define the GitHub action. Copy and paste the below while ensuring the correct branch of your codebase is referenced. For example (from the [Slim Python Starter Kit](https://github.com/NASA-AMMOS/slim-starterkit-python/blob/main/.github/workflows/codeql.yml)):
- The first step is to create a `codeql.yaml` workflow file in the `.github/workflows` directory to define the GitHub action. Copy and paste the below to your new file while ensuring the correct branch of your codebase is referenced. For example, the following configuration scans for CodeQL security and quality checks for Python language code. Note: a version of the below is also available through the [SLIM Python Starter Kit](https://github.com/NASA-AMMOS/slim-starterkit-python/blob/main/.github/workflows/codeql.yml):
- This workflow is based on the default CodeQL workflow file with three modifications:
1. Under the *Initialize CodeQL* step, the `queries` entity has been added to enable all of the available security queries
2. A new *Post-Process Output* step has been added to generate a CSV output file that may be easily ingested by other systems
Expand Down

0 comments on commit 641ff18

Please sign in to comment.