Skip to content

asml-actions-validation/dependency-review-action

 
 

dependency-review-action

This Action scans your pull requests for vulnerabilities introduced when adding or updating your project's dependencies. A check in your Pull Requests will let notify you of the results.

Screen Shot 2022-03-31 at 1 10 51 PM

Installation

  1. Add a new YAML workflow to your .github/workflows folder:
name: 'Dependency Review'
on: [pull_request]

permissions:
  contents: read

jobs:
  dependency-review:
    runs-on: ubuntu-latest
    steps:
      - name: 'Checkout Repository'
        uses: actions/checkout@v3
      - name: 'Dependency Review'
        uses: actions/dependency-review-action@v1

Getting help

If you have bug reports, questions or suggestions please create a new issue.

Contributing

We are grateful for any contributions made to this project.

Please read CONTRIBUTING.MD to get started.

License

This project is released under the MIT License.

About

A GitHub Action for detecting vulnerable dependencies and invalid licenses in your PRs

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages

  • TypeScript 97.9%
  • Ruby 2.0%
  • JavaScript 0.1%