FEAT [DTECSCSAO-4805] GHAS integration: Code scanning & Dependency review #21
Merged
pdulimitta merged 14 commits intomainfrom Jul 1, 2025
Merged
FEAT [DTECSCSAO-4805] GHAS integration: Code scanning & Dependency review #21pdulimitta merged 14 commits intomainfrom
pdulimitta merged 14 commits intomainfrom
Conversation
|
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
estrajnik
requested changes
Feb 20, 2025
estrajnik
previously requested changes
Mar 26, 2025
lony25
approved these changes
Apr 14, 2025
tlobbregt
reviewed
Apr 15, 2025
Dependency ReviewThe following issues were found:
Snapshot WarningsRe-running this action after a short time may resolve the issue. See the documentation for more information and troubleshooting advice. License Issues.github/workflows/security.code-scanning.yml
.github/workflows/security.dependency-review.yml
Scanned Files
|
Collaborator
Author
|
@dependabot recreate |
tlobbregt
approved these changes
Jun 24, 2025
sekhara-madduru
commented
Jun 25, 2025
Collaborator
Author
sekhara-madduru
left a comment
There was a problem hiding this comment.
resolved
yusharma-pp
approved these changes
Jun 30, 2025
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
JIRA ID | Git Issue
https://paypal.atlassian.net/browse/DTECSCSAO-4805
Change Type
Change Impact
Summary
Demo
Notes
The PayPal Product Security Team is replacing Coverity, Black Duck, and Cycode with GitHub Advanced Security (GHAS). This change will affect all PayPal and business unit production repositories on GitHub. GitHub Advanced Security provides three important security scanning capabilities including plaintext secrets detection, software composition analysis (SCA) for open source software (OSS) via Dependabot and Dependency Review, and static code analysis via CodeQL. We’re making this change because contracts for our existing software security tools are expiring and because we heard strong developer feedback in support of GHAS. You can access GHAS by clicking on the “Security” tab in your repository. Please keep an eye on this Security tab and respond to the security findings that appear here and in your Pull Requests (PRs). GHAS is essential to PayPal's Product Security program, ensuring we meet industry standards, regulatory mandates, and our commitment to customer security and trust.
Testing Instructions