| name | security-scanning-workflows |
| description | Comprehensive security scanning examples with SAST (CodeQL), dependency scanning, container vulnerability detection (Trivy), and SARIF upload to GitHub Security tab. |
Security Scanning Workflows
When to Use This Skill
Copy-paste ready security scanning workflow templates with comprehensive coverage. Each example demonstrates SAST with CodeQL, dependency vulnerability detection, container image scanning with Trivy, and SARIF upload to GitHub Security tab for centralized visibility.
Complete Security Patterns
These workflows integrate all security scanning patterns: SHA-pinned actions, minimal GITHUB_TOKEN permissions (
security-events: writefor SARIF upload), automated scanning on every PR and push, SARIF result aggregation in GitHub Security tab, and security gates that block merges on critical findings.
Implementation
See the full implementation guide in the source documentation.
Key Principles
Every security scanning workflow in this guide implements these controls:
- SAST Integration: Static analysis with CodeQL to detect code-level vulnerabilities
- Dependency Scanning: Automated vulnerability detection in dependencies with severity-based gates
- Container Scanning: Image vulnerability scanning with Trivy before deployment
- SARIF Upload: Centralized findings in GitHub Security tab for audit and tracking
- Security Gates: Block merges on critical/high severity findings
- Minimal Permissions:
security-events: writescoped to scanning jobs only - Scan All Changes: Automated scanning on every PR and main branch push
Full Reference
See reference.md for complete documentation.