You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Security Checker will check your `composer.lock` file for known security vulnerabilities.
4
+
5
+
***Config***
6
+
7
+
The task lives under the `securitychecker_composeraudit` namespace and has the following configurable parameters:
8
+
9
+
```yaml
10
+
# grumphp.yml
11
+
grumphp:
12
+
tasks:
13
+
securitychecker_composeraudit:
14
+
locked: true
15
+
no_dev: false
16
+
run_always: false
17
+
working_dir: ./
18
+
```
19
+
20
+
**format**
21
+
22
+
*Default: null*
23
+
24
+
You can choose the format of the output. The available options are `table`, `plain`, `json` and `summary`. By default, grumphp will use the format `table`.
25
+
26
+
**locked**
27
+
28
+
*Default: true*
29
+
30
+
Audit packages from the lock file, regardless of what is currently in vendor dir.
31
+
32
+
**no_dev**
33
+
34
+
*Default: false*
35
+
36
+
When this option is set to `true`, the task will skip packages under `require-dev`.
37
+
38
+
**run_always**
39
+
40
+
*Default: false*
41
+
42
+
When this option is set to `false`, the task will only run when the `composer.lock` file has changed. If it is set to `true`, the `composer.lock` file will be checked on every commit.
43
+
44
+
**working_dir**
45
+
46
+
*Default: ./*
47
+
48
+
If your `composer.lock` file is located in an exotic location, you can specify the location with this option. By default, the task will try to load a `composer.lock` file in the current directory.
0 commit comments