ci: add periodic security-scan cron workflow (#72)#74
Merged
Conversation
Runs ci.yml's image-scan (Trivy) and govulncheck jobs against latest `main` daily at 06:00 UTC, plus workflow_dispatch for manual re-runs. Closes the post-merge invisibility window where CVEs disclosed against unchanged deps produce no PR signal. Pins mirror ci.yml exactly (trivy-action SHA + govulncheck@v1.1.4) per the lockstep convention. Permissions are contents: read at both workflow and job level; issues: write for auto-issue filing lands with #73. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
Contributor
Author
Code Review: #72Decision: PASS FindingsNone. SummaryThe PR adds a single new file
Security review (label:
|
Add per-ticket codebase notes for #72, fold periodic re-scan into the docker-image feature doc + threat-model § Supply chain so the post-merge invisibility window is documented as closed, and extend the INDEX entry accordingly. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
What
Adds
.github/workflows/security-scan.yml— a scheduled workflow that re-runs the same two security scanners that gate PRs (image-scanTrivy from #68 andgovulncheckfrom #41) against the latestmainSHA, on a daily cron (06:00 UTC) plusworkflow_dispatchfor manual re-runs.The goal is to close the post-merge invisibility window: CVEs disclosed today against deps that haven't changed since the last PR otherwise produce no signal until someone next bumps the affected dep. The cron caps that window at ~24h via a red row in the Actions list. Auto-issue filing on top of that signal is deferred to #73.
Issue
Closes #72.
Testing
go vet ./...andgo test -race ./...clean (no Go code touched, but verified).ci.ymlverified mechanically:ed142fd0673e97e23eac54620cfb913e5ce36c25(tracksaquasecurity/trivy-action@v0.36.0) — matchesci.ymlline 70.govulncheck@v1.1.4— matchesci.ymlline 43.workflow_dispatchagainstmainfrom the Actions UI and confirm both jobs complete green. The vulnerable-state path is exercised by relay: auto-file GitHub issue when periodic security-scan finds a regression #73's auto-issue test.Architecture compliance
Follows
docs/specs/architecture/72-periodic-security-scan.mdverbatim:ci.yml, no reusable workflow / composite action (clarity over DRY at v1, per AC relay: WS upgrade for /v1/client — accept phone connection, look up server-id, register #5).image-scan,govulncheck) — independent surfaces produce independent check entries.permissions: contents: readat workflow level + job level on each job (belt-and-suspenders mirror ofci.yml). Noissues: write— deferred to relay: auto-file GitHub issue when periodic security-scan finds a regression #73.gosecintentionally not ported (spec § Out of scope: source-static-analysis output doesn't change on unchangedmain).# Tracks:comments preserved on both pins per the lockstep convention.ref: mainonactions/checkoutso aworkflow_dispatchfrom a feature branch still scansmain(AC feat(relay): routing-envelope wrapper type (#1) #2).🤖 Generated with Claude Code