This is an automated email from the ASF dual-hosted git repository.

pcongiusti pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel.git


The following commit(s) were added to refs/heads/main by this push:
     new 7717745b31c6 chore(ci): add OWASP dependency check scheduled workflow
7717745b31c6 is described below

commit 7717745b31c6e284611c8cb152a9a2871626be22
Author: Guillaume Nodet <[email protected]>
AuthorDate: Thu Dec 4 07:24:21 2025 +0000

    chore(ci): add OWASP dependency check scheduled workflow
    
    Add a new GitHub Actions workflow that runs the OWASP dependency-check
    plugin on a weekly schedule (Sundays at 4 AM UTC) to scan for known
    security vulnerabilities in project dependencies.
    
    Features:
    - Uses the existing dependencycheck Maven profile
    - Uploads HTML and JSON reports as artifacts (retained for 30 days)
    - Can be manually triggered via workflow_dispatch
    - Provides a job summary with basic status information
    
    This helps maintain security visibility and catch vulnerable
    dependencies before they become a problem.
---
 .github/workflows/security-scan.yml | 63 +++++++++++++++++++++++++++++++++++++
 1 file changed, 63 insertions(+)

diff --git a/.github/workflows/security-scan.yml 
b/.github/workflows/security-scan.yml
new file mode 100644
index 000000000000..21ef3807dba4
--- /dev/null
+++ b/.github/workflows/security-scan.yml
@@ -0,0 +1,63 @@
+#
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements.  See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License.  You may obtain a copy of the License at
+#
+#      http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+name: Security Vulnerability Scan
+
+on:
+  schedule:
+    # Weekly on Sundays at 4 AM UTC
+    - cron: '0 4 * * 0'
+  workflow_dispatch:
+
+permissions:
+  contents: read
+
+jobs:
+  owasp-check:
+    if: github.repository == 'apache/camel'
+    runs-on: ubuntu-latest
+    steps:
+      - name: Checkout repository
+        uses: actions/checkout@v4
+        with:
+          persist-credentials: false
+      - name: Set up JDK 17
+        uses: actions/setup-java@v4
+        with:
+          distribution: 'temurin'
+          java-version: '17'
+          cache: 'maven'
+      - name: OWASP Dependency Check
+        run: ./mvnw -B -Pdependencycheck validate -DskipTests -l 
owasp-check.log
+      - name: Upload OWASP Report
+        uses: actions/upload-artifact@v4
+        if: always()
+        with:
+          name: owasp-dependency-check-report
+          path: |
+            **/target/dependency-check-report.html
+            **/target/dependency-check-report.json
+            owasp-check.log
+          retention-days: 30
+      - name: Job Summary
+        if: always()
+        run: |
+          echo "## OWASP Dependency Check Results" >> $GITHUB_STEP_SUMMARY
+          echo "" >> $GITHUB_STEP_SUMMARY
+          echo "The OWASP dependency check has completed." >> 
$GITHUB_STEP_SUMMARY
+          echo "Download the artifacts for detailed HTML and JSON reports." >> 
$GITHUB_STEP_SUMMARY
+

Reply via email to