Skip to main content
Glama
codeql-analysis.ymlβ€’5.19 kB
name: πŸ”’ CodeQL Security Analysis on: push: branches: [main, develop] pull_request: branches: [main, develop] schedule: # Run CodeQL analysis daily at 3 AM UTC for comprehensive coverage - cron: "0 3 * * *" workflow_dispatch: permissions: actions: read contents: read security-events: write packages: read env: NODE_VERSION: "20" jobs: codeql-analyze: name: πŸ” CodeQL Analysis runs-on: ubuntu-latest timeout-minutes: 30 strategy: fail-fast: false matrix: # Use javascript-typescript for comprehensive coverage language: ["javascript-typescript"] # Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support steps: - name: πŸ“₯ Checkout Code uses: actions/checkout@v4 - name: πŸ“¦ Setup Node.js uses: actions/setup-node@v4 with: node-version: ${{ env.NODE_VERSION }} cache: "npm" - name: πŸ“¦ Install Dependencies run: npm ci env: HUSKY: 0 - name: πŸ—οΈ Build Project run: npm run build env: HUSKY: 0 # Initializes the CodeQL tools for scanning. - name: πŸ”§ Initialize CodeQL uses: github/codeql-action/init@v3 with: languages: ${{ matrix.language }} # Use comprehensive security queries queries: +security-extended,security-and-quality config: | name: "Enhanced CodeQL Config" queries: - uses: security-and-quality - uses: security-extended paths-ignore: - node_modules - dist - coverage - docs - .github - tests/**/*.test.js - "**/*.min.js" paths: - src - "*.js" - "*.ts" # Autobuild attempts to build any compiled languages - name: πŸ€– Autobuild uses: github/codeql-action/autobuild@v3 - name: πŸ” Perform CodeQL Analysis uses: github/codeql-action/analyze@v3 with: category: "/language:${{matrix.language}}" # Upload results to GitHub Security tab upload: true # Don't fail the workflow if vulnerabilities are found fail-on: error # Wait for processing to complete wait-for-processing: true - name: πŸ“Š Security Analysis Summary if: always() run: | echo "## πŸ”’ CodeQL Security Analysis Completed" >> $GITHUB_STEP_SUMMARY echo "**Language:** ${{ matrix.language }}" >> $GITHUB_STEP_SUMMARY echo "**Status:** Analysis completed and uploaded to GitHub Security tab" >> $GITHUB_STEP_SUMMARY echo "**Next Steps:** Review any security findings in the Security tab" >> $GITHUB_STEP_SUMMARY echo "" >> $GITHUB_STEP_SUMMARY echo "### πŸ“‹ Analysis Details" >> $GITHUB_STEP_SUMMARY echo "- **Queries Used:** Security Extended + Security and Quality" >> $GITHUB_STEP_SUMMARY echo "- **Paths Analyzed:** src/, *.js, *.ts" >> $GITHUB_STEP_SUMMARY echo "- **Paths Ignored:** node_modules, dist, coverage, docs, tests" >> $GITHUB_STEP_SUMMARY echo "- **Upload Status:** Results uploaded to GitHub Security tab" >> $GITHUB_STEP_SUMMARY echo "" >> $GITHUB_STEP_SUMMARY echo "Check the Security tab for detailed results." >> $GITHUB_STEP_SUMMARY # Security recommendations job security-recommendations: name: πŸ“‹ Security Recommendations runs-on: ubuntu-latest needs: codeql-analyze if: always() steps: - name: πŸ“₯ Checkout Code uses: actions/checkout@v4 - name: πŸ” Generate Security Recommendations run: | echo "## πŸ›‘οΈ Security Recommendations" >> $GITHUB_STEP_SUMMARY echo "" >> $GITHUB_STEP_SUMMARY echo "### πŸ”’ CodeQL Analysis" >> $GITHUB_STEP_SUMMARY echo "- βœ… Static analysis completed for JavaScript/TypeScript" >> $GITHUB_STEP_SUMMARY echo "- πŸ“Š Results available in GitHub Security tab" >> $GITHUB_STEP_SUMMARY echo "- πŸ” Enhanced security queries applied" >> $GITHUB_STEP_SUMMARY echo "" >> $GITHUB_STEP_SUMMARY echo "### πŸ“ Next Steps" >> $GITHUB_STEP_SUMMARY echo "1. Review security findings in the Security tab" >> $GITHUB_STEP_SUMMARY echo "2. Address any high-severity vulnerabilities" >> $GITHUB_STEP_SUMMARY echo "3. Consider implementing suggested code improvements" >> $GITHUB_STEP_SUMMARY echo "4. Update dependencies if vulnerabilities are found" >> $GITHUB_STEP_SUMMARY echo "" >> $GITHUB_STEP_SUMMARY echo "### πŸ”— Resources" >> $GITHUB_STEP_SUMMARY echo "- [CodeQL Documentation](https://codeql.github.com/docs/)" >> $GITHUB_STEP_SUMMARY echo "- [Security Best Practices](https://docs.github.com/en/code-security)" >> $GITHUB_STEP_SUMMARY echo "- [GitHub Security Advisories](https://github.com/advisories)" >> $GITHUB_STEP_SUMMARY

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/docdyhr/mcp-wordpress'

If you have feedback or need assistance with the MCP directory API, please join our Discord server