Enhance code analysis workflow by adding workspace sanity checks and refining OSV-Scanner commands to ensure proper execution with package-lock.json, improving overall reliability of the analysis process.
Some checks failed
Code Analysis (JS/Vue) / analyze (push) Has been cancelled

This commit is contained in:
Torsten Schulz (local)
2025-12-20 16:01:25 +01:00
parent ca204e6ef9
commit 0afdfec33b

View File

@@ -12,6 +12,14 @@ jobs:
- name: Checkout - name: Checkout
uses: actions/checkout@v4 uses: actions/checkout@v4
- name: Workspace sanity check
run: |
echo "PWD: $(pwd)"
echo "LS:"
ls -la
echo "Lockfiles:"
ls -la package-lock.json || true
- name: Node versions - name: Node versions
run: | run: |
node -v node -v
@@ -65,10 +73,12 @@ jobs:
run: semgrep --config p/default --error . run: semgrep --config p/default --error .
- name: npm audit (high+) - name: npm audit (high+)
run: npm audit --audit-level=high || true run: npm audit --audit-level=high
- name: OSV-Scanner (SCA) - name: OSV-Scanner (SCA)
run: | run: |
curl -L -o osv-scanner https://github.com/google/osv-scanner/releases/latest/download/osv-scanner_linux_amd64 curl -L -o osv-scanner https://github.com/google/osv-scanner/releases/latest/download/osv-scanner_linux_amd64
chmod +x osv-scanner chmod +x osv-scanner
./osv-scanner --lockfile package-lock.json ./osv-scanner --version
test -f ./package-lock.json
./osv-scanner --lockfile ./package-lock.json