-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathsecurity-scan.yml
More file actions
745 lines (647 loc) Β· 25.3 KB
/
security-scan.yml
File metadata and controls
745 lines (647 loc) Β· 25.3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
# ============================================================================
# Advanced Security Scanning Workflow
# Combines SAST + SCA + Secret Detection + Malware Scanning
# Detects: CWEs, CVEs, Secrets, Malware, Vulnerabilities
# ============================================================================
name: "π Advanced Security Scanning"
on:
push:
branches: [ "main", "master", "develop" ]
pull_request:
branches: [ "main", "master" ]
schedule:
- cron: '27 9 * * 0' # Weekly scan on Sunday
workflow_dispatch: # Manual trigger
permissions:
actions: read
contents: read
security-events: write
pull-requests: write
issues: write
jobs:
# ============================================================================
# JOB 1: CodeQL SAST Analysis (CWE Detection)
# Detects: Code vulnerabilities, CWEs, security issues
# ============================================================================
codeql-sast:
name: "π CodeQL SAST - ${{ matrix.language }}"
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
timeout-minutes: 360
permissions:
security-events: write
packages: read
actions: read
contents: read
strategy:
fail-fast: false
matrix:
include:
- language: csharp
build-mode: manual
setup-required: true
- language: java-kotlin
build-mode: manual
setup-required: true
- language: javascript-typescript
build-mode: none
setup-required: false
- language: python
build-mode: none
setup-required: false
steps:
- name: π₯ Checkout repository
uses: actions/checkout@v4
with:
fetch-depth: 0 # Full history for better analysis
# ========================================
# Setup for C# (.NET)
# ========================================
- name: βοΈ Setup .NET SDK
if: matrix.language == 'csharp'
uses: actions/setup-dotnet@v4
with:
dotnet-version: |
6.0.x
7.0.x
8.0.x
# ========================================
# Setup for Java/Kotlin
# ========================================
- name: βοΈ Setup Java JDK
if: matrix.language == 'java-kotlin'
uses: actions/setup-java@v4
with:
distribution: 'temurin'
java-version: '17'
cache: 'maven'
# ========================================
# Setup for Python
# ========================================
- name: βοΈ Setup Python
if: matrix.language == 'python'
uses: actions/setup-python@v5
with:
python-version: '3.11'
cache: 'pip'
# ========================================
# Setup for JavaScript/TypeScript
# ========================================
- name: βοΈ Setup Node.js
if: matrix.language == 'javascript-typescript'
uses: actions/setup-node@v4
with:
node-version: '20'
cache: 'npm'
# ========================================
# Initialize CodeQL with Enhanced Queries
# ========================================
- name: π§ Initialize CodeQL
uses: github/codeql-action/init@v3
with:
languages: ${{ matrix.language }}
build-mode: ${{ matrix.build-mode }}
# Enhanced security queries for comprehensive CWE detection
queries: +security-extended,security-and-quality
config: |
name: "Advanced Security Configuration"
# Exclude non-production code
paths-ignore:
- '**/test/**'
- '**/tests/**'
- '**/Test/**'
- '**/Tests/**'
- '**/*.test.js'
- '**/*.spec.js'
- '**/*.test.ts'
- '**/*.spec.ts'
- '**/obj/**'
- '**/bin/**'
- '**/node_modules/**'
- '**/vendor/**'
- '**/*.Designer.cs'
- '**/*.designer.cs'
- '**/*.generated.cs'
- '**/*.g.cs'
- '**/Migrations/**'
# Focus on source code
paths:
- 'src/**'
- 'app/**'
- 'lib/**'
- 'core/**'
# Query filters for high-quality results
query-filters:
- include:
kind: problem
problem.severity:
- error
- warning
- include:
tags contain: security
- include:
tags contain: external/cwe
# Enable advanced features
trap-caching: true
# ========================================
# Manual Build for C#
# ========================================
- name: π¨ Build C# Project
if: matrix.language == 'csharp' && matrix.build-mode == 'manual'
run: |
echo "π Discovering .NET projects..."
find . -name "*.sln" -o -name "*.csproj" | head -10
echo "π¦ Restoring NuGet packages..."
dotnet restore --verbosity minimal
echo "ποΈ Building projects in Release mode..."
dotnet build --configuration Release --no-restore --verbosity minimal /p:UseSharedCompilation=false /p:TreatWarningsAsErrors=false
echo "β
Build completed successfully"
# ========================================
# Manual Build for Java/Kotlin
# ========================================
- name: π¨ Build Java/Kotlin Project
if: matrix.language == 'java-kotlin' && matrix.build-mode == 'manual'
run: |
echo "π Detecting build system..."
if [ -f "pom.xml" ]; then
echo "π¦ Maven project detected"
mvn clean install -DskipTests -B -V
elif [ -f "build.gradle" ] || [ -f "build.gradle.kts" ]; then
echo "π¦ Gradle project detected"
./gradlew build -x test --no-daemon
else
echo "β οΈ No recognized build file found"
fi
echo "β
Build completed successfully"
# ========================================
# Perform CodeQL Analysis
# ========================================
- name: π¬ Perform CodeQL Analysis
uses: github/codeql-action/analyze@v3
with:
category: "/language:${{ matrix.language }}"
output: sarif-results
upload: true
# Add detailed output
add-snippets: true
# ========================================
# Upload SARIF Results
# ========================================
- name: π€ Upload CodeQL SARIF Results
uses: actions/upload-artifact@v4
if: always()
with:
name: codeql-sarif-${{ matrix.language }}
path: sarif-results
retention-days: 30
# ============================================================================
# JOB 2: Dependency Scanning - SCA (CVE Detection)
# Detects: Known vulnerabilities in dependencies (CVEs)
# ============================================================================
dependency-sca:
name: "π¦ SCA - Dependency & CVE Scanning"
runs-on: ubuntu-latest
steps:
- name: π₯ Checkout repository
uses: actions/checkout@v4
# ========================================
# .NET Dependency Scanning
# ========================================
- name: βοΈ Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: '8.0.x'
- name: π Scan .NET Dependencies for CVEs
continue-on-error: true
run: |
echo "π Scanning .NET dependencies for known vulnerabilities..."
# Check for vulnerable packages
dotnet list package --vulnerable --include-transitive 2>&1 | tee dotnet-vulnerabilities.txt
# Generate detailed report
echo "## π .NET Dependency Vulnerability Report" > dependency-report.md
echo "" >> dependency-report.md
if grep -q "has the following vulnerable packages" dotnet-vulnerabilities.txt; then
echo "β οΈ **VULNERABILITIES FOUND**" >> dependency-report.md
echo "" >> dependency-report.md
cat dotnet-vulnerabilities.txt >> dependency-report.md
echo "::warning::Vulnerable .NET dependencies detected!"
else
echo "β
No known vulnerabilities found in .NET dependencies" >> dependency-report.md
fi
# ========================================
# Generate SBOM (Software Bill of Materials)
# ========================================
- name: π Generate SBOM
continue-on-error: true
run: |
echo "π Generating Software Bill of Materials..."
# Install CycloneDX for .NET
dotnet tool install --global CycloneDX
# Generate SBOM in multiple formats
dotnet CycloneDX . -o . -f sbom.json -t
dotnet CycloneDX . -o . -f sbom.xml -t
echo "β
SBOM generated successfully"
- name: π€ Upload SBOM
uses: actions/upload-artifact@v4
with:
name: sbom-reports
path: |
sbom.json
sbom.xml
retention-days: 90
# ========================================
# NPM Dependency Scanning (if applicable)
# ========================================
- name: π Scan NPM Dependencies
if: hashFiles('**/package.json') != ''
continue-on-error: true
run: |
echo "π Scanning NPM dependencies..."
if [ -f "package.json" ]; then
npm audit --json > npm-audit.json || true
npm audit --audit-level=moderate || echo "::warning::NPM vulnerabilities detected"
fi
# ========================================
# Python Dependency Scanning (if applicable)
# ========================================
- name: π Scan Python Dependencies
if: hashFiles('**/requirements.txt', '**/Pipfile', '**/pyproject.toml') != ''
continue-on-error: true
run: |
echo "π Scanning Python dependencies..."
pip install safety
if [ -f "requirements.txt" ]; then
safety check --file requirements.txt --json > python-safety.json || true
safety check --file requirements.txt || echo "::warning::Python vulnerabilities detected"
fi
# ========================================
# Dependency Review (for Pull Requests)
# ========================================
- name: π Dependency Review
if: github.event_name == 'pull_request'
uses: actions/dependency-review-action@v4
with:
fail-on-severity: moderate
deny-licenses: GPL-2.0, GPL-3.0, AGPL-3.0
comment-summary-in-pr: always
# ========================================
# Upload Dependency Reports
# ========================================
- name: π€ Upload Dependency Reports
uses: actions/upload-artifact@v4
if: always()
with:
name: dependency-scan-reports
path: |
dotnet-vulnerabilities.txt
dependency-report.md
npm-audit.json
python-safety.json
retention-days: 30
# ============================================================================
# JOB 3: Secret Scanning
# Detects: API keys, passwords, tokens, credentials
# ============================================================================
secret-detection:
name: "π Secret & Credential Detection"
runs-on: ubuntu-latest
steps:
- name: π₯ Checkout repository
uses: actions/checkout@v4
with:
fetch-depth: 0 # Full history for comprehensive scanning
# ========================================
# Gitleaks - Secret Detection
# ========================================
- name: π Gitleaks Secret Scan
uses: gitleaks/gitleaks-action@v2
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
# ========================================
# TruffleHog - Advanced Secret Detection
# ========================================
- name: π TruffleHog Secret Scan
continue-on-error: true
run: |
echo "π Running TruffleHog secret scanner..."
# Install TruffleHog
docker pull trufflesecurity/trufflehog:latest
# Scan repository
docker run --rm -v "$PWD:/scan" trufflesecurity/trufflehog:latest \
filesystem /scan \
--json \
--no-update \
> trufflehog-results.json || true
# Check results
if [ -s trufflehog-results.json ]; then
echo "::warning::Potential secrets detected by TruffleHog"
cat trufflehog-results.json
fi
# ========================================
# Detect-Secrets - Additional Layer
# ========================================
- name: π Detect-Secrets Scan
continue-on-error: true
run: |
echo "π Running detect-secrets scanner..."
pip install detect-secrets
# Create baseline
detect-secrets scan --all-files --force-use-all-plugins > .secrets.baseline
# Audit results
detect-secrets audit .secrets.baseline || echo "::warning::Potential secrets detected"
- name: π€ Upload Secret Scan Results
uses: actions/upload-artifact@v4
if: always()
with:
name: secret-scan-results
path: |
trufflehog-results.json
.secrets.baseline
retention-days: 30
# ============================================================================
# JOB 4: Malware & Virus Scanning
# Detects: Malware, viruses, trojans, suspicious code
# ============================================================================
malware-scan:
name: "π¦ Malware & Virus Detection"
runs-on: ubuntu-latest
steps:
- name: π₯ Checkout repository
uses: actions/checkout@v4
# ========================================
# ClamAV Antivirus Scan
# ========================================
- name: π¦ ClamAV Malware Scan
continue-on-error: true
run: |
echo "π¦ Installing ClamAV..."
sudo apt-get update
sudo apt-get install -y clamav clamav-daemon
echo "π₯ Updating virus definitions..."
sudo systemctl stop clamav-freshclam
sudo freshclam
echo "π Scanning repository for malware..."
clamscan -r --bell -i . | tee clamav-scan.txt
if grep -q "Infected files: 0" clamav-scan.txt; then
echo "β
No malware detected"
else
echo "::error::Malware detected in repository!"
exit 1
fi
# ========================================
# YARA Rules Scan (Advanced Pattern Matching)
# ========================================
- name: π YARA Pattern Scan
continue-on-error: true
run: |
echo "π Installing YARA..."
sudo apt-get install -y yara
# Create basic YARA rules for suspicious patterns
cat > suspicious.yar << 'EOF'
rule SuspiciousBase64
{
strings:
$base64 = /[A-Za-z0-9+\/]{40,}={0,2}/ nocase
condition:
$base64
}
rule SuspiciousEval
{
strings:
$eval1 = "eval(" nocase
$eval2 = "exec(" nocase
$eval3 = "system(" nocase
condition:
any of them
}
rule ObfuscatedCode
{
strings:
$obf1 = /\\x[0-9a-f]{2}/i
$obf2 = /\\u[0-9a-f]{4}/i
condition:
any of them
}
EOF
echo "π Scanning for suspicious patterns..."
yara -r suspicious.yar . | tee yara-results.txt || true
- name: π€ Upload Malware Scan Results
uses: actions/upload-artifact@v4
if: always()
with:
name: malware-scan-results
path: |
clamav-scan.txt
yara-results.txt
retention-days: 30
# ============================================================================
# JOB 5: Additional SAST Tools
# Enhanced static analysis with multiple tools
# ============================================================================
additional-sast:
name: "π¬ Additional SAST Analysis"
runs-on: ubuntu-latest
steps:
- name: π₯ Checkout repository
uses: actions/checkout@v4
# ========================================
# Semgrep - Fast SAST
# ========================================
- name: π Semgrep SAST Scan
uses: returntocorp/semgrep-action@v1
with:
config: >-
p/security-audit
p/secrets
p/owasp-top-ten
p/cwe-top-25
p/r2c-security-audit
p/sql-injection
p/xss
p/command-injection
generateSarif: true
# ========================================
# Snyk - Security & License Scanning
# ========================================
- name: π Snyk Security Scan
uses: snyk/actions/dotnet@master
continue-on-error: true
env:
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
with:
args: --all-projects --severity-threshold=medium --sarif-file-output=snyk.sarif
- name: π€ Upload Snyk SARIF
uses: github/codeql-action/upload-sarif@v3
if: always()
with:
sarif_file: snyk.sarif
# ========================================
# Bandit - Python Security Linter
# ========================================
- name: π Bandit Python Security Scan
if: hashFiles('**/*.py') != ''
continue-on-error: true
run: |
echo "π Running Bandit Python security scanner..."
pip install bandit
bandit -r . -f json -o bandit-results.json || true
bandit -r . || echo "::warning::Python security issues detected"
# ========================================
# ESLint Security Plugin (JavaScript/TypeScript)
# ========================================
- name: π ESLint Security Scan
if: hashFiles('**/*.js', '**/*.ts') != ''
continue-on-error: true
run: |
if [ -f "package.json" ]; then
echo "π Running ESLint security scanner..."
npm install -g eslint eslint-plugin-security
eslint . --ext .js,.ts --format json > eslint-results.json || true
fi
- name: π€ Upload SAST Results
uses: actions/upload-artifact@v4
if: always()
with:
name: additional-sast-results
path: |
bandit-results.json
eslint-results.json
retention-days: 30
# ============================================================================
# JOB 6: Container Security (if Docker is used)
# ============================================================================
container-security:
name: "π³ Container Security Scan"
runs-on: ubuntu-latest
if: hashFiles('**/Dockerfile', '**/docker-compose.yml') != ''
steps:
- name: π₯ Checkout repository
uses: actions/checkout@v4
# ========================================
# Trivy - Container Vulnerability Scanner
# ========================================
- name: π Trivy Filesystem Scan
uses: aquasecurity/trivy-action@master
with:
scan-type: 'fs'
scan-ref: '.'
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH,MEDIUM'
vuln-type: 'os,library'
- name: π€ Upload Trivy SARIF
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
# ========================================
# Hadolint - Dockerfile Linter
# ========================================
- name: π Hadolint Dockerfile Scan
uses: hadolint/hadolint-action@v3.1.0
with:
dockerfile: Dockerfile
format: sarif
output-file: hadolint-results.sarif
no-fail: true
- name: π€ Upload Hadolint SARIF
uses: github/codeql-action/upload-sarif@v3
if: always()
with:
sarif_file: hadolint-results.sarif
# ============================================================================
# JOB 7: License Compliance Check
# ============================================================================
license-compliance:
name: "βοΈ License Compliance Check"
runs-on: ubuntu-latest
steps:
- name: π₯ Checkout repository
uses: actions/checkout@v4
- name: βοΈ Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: '8.0.x'
- name: π License Compliance Scan
continue-on-error: true
run: |
echo "π Scanning for license compliance..."
# Install license checker
dotnet tool install --global dotnet-project-licenses
# Generate license report
dotnet-project-licenses --input . --output-directory licenses --export-license-texts
echo "β
License report generated"
- name: π€ Upload License Report
uses: actions/upload-artifact@v4
with:
name: license-compliance-report
path: licenses/
retention-days: 90
# ============================================================================
# JOB 8: Security Summary Report
# Consolidates all scan results
# ============================================================================
security-summary:
name: "π Security Summary Report"
runs-on: ubuntu-latest
needs: [codeql-sast, dependency-sca, secret-detection, malware-scan, additional-sast]
if: always()
steps:
- name: π Generate Security Summary
run: |
echo "# π Comprehensive Security Scan Report" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo "## π Scan Results Overview" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo "| Security Check | Status |" >> $GITHUB_STEP_SUMMARY
echo "|---------------|--------|" >> $GITHUB_STEP_SUMMARY
echo "| π CodeQL SAST (CWE Detection) | ${{ needs.codeql-sast.result }} |" >> $GITHUB_STEP_SUMMARY
echo "| π¦ Dependency SCA (CVE Detection) | ${{ needs.dependency-sca.result }} |" >> $GITHUB_STEP_SUMMARY
echo "| π Secret Detection | ${{ needs.secret-detection.result }} |" >> $GITHUB_STEP_SUMMARY
echo "| π¦ Malware Scan | ${{ needs.malware-scan.result }} |" >> $GITHUB_STEP_SUMMARY
echo "| π¬ Additional SAST | ${{ needs.additional-sast.result }} |" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo "## π― What Was Scanned" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo "β
**CWE Detection** - Common Weakness Enumeration (code vulnerabilities)" >> $GITHUB_STEP_SUMMARY
echo "β
**CVE Detection** - Known vulnerabilities in dependencies" >> $GITHUB_STEP_SUMMARY
echo "β
**Secret Detection** - API keys, passwords, tokens" >> $GITHUB_STEP_SUMMARY
echo "β
**Malware Detection** - Viruses, trojans, suspicious code" >> $GITHUB_STEP_SUMMARY
echo "β
**SAST Analysis** - Static code security analysis" >> $GITHUB_STEP_SUMMARY
echo "β
**SCA Analysis** - Software composition analysis" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo "## π Detailed Reports" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo "View detailed results in:" >> $GITHUB_STEP_SUMMARY
echo "- π **Security tab** - CodeQL findings" >> $GITHUB_STEP_SUMMARY
echo "- π¦ **Artifacts** - Detailed scan reports" >> $GITHUB_STEP_SUMMARY
echo "- π **Actions logs** - Full scan output" >> $GITHUB_STEP_SUMMARY
echo "" >> $GITHUB_STEP_SUMMARY
echo "---" >> $GITHUB_STEP_SUMMARY
echo "π **Security Scan Completed** - $(date)" >> $GITHUB_STEP_SUMMARY
# ========================================
# Create GitHub Issue for Critical Findings
# ========================================
- name: π¨ Create Security Issue (if failures)
if: |
needs.codeql-sast.result == 'failure' ||
needs.dependency-sca.result == 'failure' ||
needs.secret-detection.result == 'failure' ||
needs.malware-scan.result == 'failure'
uses: actions/github-script@v7
with:
script: |
github.rest.issues.create({
owner: context.repo.owner,
repo: context.repo.repo,
title: 'π¨ Security Scan Detected Critical Issues',
body: `## π Security Scan Alert
Critical security issues were detected in the latest scan.
**Workflow Run:** ${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}
**Failed Checks:**
- CodeQL SAST: ${{ needs.codeql-sast.result }}
- Dependency SCA: ${{ needs.dependency-sca.result }}
- Secret Detection: ${{ needs.secret-detection.result }}
- Malware Scan: ${{ needs.malware-scan.result }}
Please review the Security tab and workflow artifacts for detailed findings.
**Action Required:** Address these security issues before merging.`,
labels: ['security', 'critical', 'automated']
})