This is an automated email from the ASF dual-hosted git repository.

zehnder pushed a commit to branch 3850-remove-duplicate-vulnerability-scanning
in repository https://gitbox.apache.org/repos/asf/streampipes.git


The following commit(s) were added to 
refs/heads/3850-remove-duplicate-vulnerability-scanning by this push:
     new 157339f4b6 fix(#3850): Remove osv scanner action
157339f4b6 is described below

commit 157339f4b6c07fdf5f8f76dafe7d8d697fbae937
Author: Philipp Zehnder <[email protected]>
AuthorDate: Fri Oct 17 10:05:59 2025 +0200

    fix(#3850): Remove osv scanner action
---
 .github/workflows/osv-scanner.yml | 54 ---------------------------------------
 VULNERABILITY.md                  | 11 --------
 2 files changed, 65 deletions(-)

diff --git a/.github/workflows/osv-scanner.yml 
b/.github/workflows/osv-scanner.yml
deleted file mode 100644
index e3ffcd840f..0000000000
--- a/.github/workflows/osv-scanner.yml
+++ /dev/null
@@ -1,54 +0,0 @@
-# Licensed to the Apache Software Foundation (ASF) under one or more
-# contributor license agreements.  See the NOTICE file distributed with
-# this work for additional information regarding copyright ownership.
-# The ASF licenses this file to You under the Apache License, Version 2.0
-# (the "License"); you may not use this file except in compliance with
-# the License.  You may obtain a copy of the License at
-#
-#    http://www.apache.org/licenses/LICENSE-2.0
-#
-# Unless required by applicable law or agreed to in writing, software
-# distributed under the License is distributed on an "AS IS" BASIS,
-# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-# See the License for the specific language governing permissions and
-# limitations under the License.
-
-name: OSV Scanner
-
-on:
-  workflow_dispatch:
-  schedule:
-    - cron: "0 0 1 * *"
-
-jobs:
-  run-osv-scanner:
-    name: Run OSV Scanner
-    runs-on: ubuntu-latest
-
-    steps:
-      - name: Checkout
-        uses: actions/checkout@v5
-
-      - name: Pull OSV Scanner Docker image
-        run: docker pull ghcr.io/google/osv-scanner:latest
-
-      - name: Scan for vulnerabilities
-        run: |
-          echo -e '<!--\n  ~ Licensed to the Apache Software Foundation (ASF) 
under one or more\n  ~ contributor license agreements.  See the NOTICE file 
distributed with\n  ~ this work for additional information regarding copyright 
ownership.\n  ~ The ASF licenses this file to You under the Apache License, 
Version 2.0\n  ~ (the "License"); you may not use this file except in 
compliance with\n  ~ the License.  You may obtain a copy of the License at\n  
~\n  ~    http://www.apache.org/lic [...]
-          docker run --rm -v $PWD:/repo -w /repo ghcr.io/google/osv-scanner 
--format markdown -r . 2>&1 | grep -vE '^((Scanning|Scanned|Failed).*)$' >> 
VULNERABILITY.md
-        continue-on-error: true
-
-      - name: Create Pull Request
-        id: cpr
-        uses: peter-evans/create-pull-request@v7
-        with:
-          token: ${{ secrets.GITHUB_TOKEN }}
-          committer: github-actions[bot] 
<41898282+github-actions[bot]@users.noreply.github.com>
-          author: ${{ github.actor }} <${{ github.actor_id }}+${{ github.actor 
}}@users.noreply.github.com>
-          signoff: true
-          title: Monthly update of vulnerability report
-          commit-message: monthly update of vulnerability report
-          body: |
-            Update *Vulnerablity* report
-          delete-branch: true
-          reviewers: 
"dominikriemer,tenthe,svenO3,smlabt,grainier,RobertIndie,bossenti"
diff --git a/VULNERABILITY.md b/VULNERABILITY.md
deleted file mode 100644
index 00255213a5..0000000000
--- a/VULNERABILITY.md
+++ /dev/null
@@ -1,11 +0,0 @@
-<!--\n  ~ Licensed to the Apache Software Foundation (ASF) under one or more\n 
 ~ contributor license agreements.  See the NOTICE file distributed with\n  ~ 
this work for additional information regarding copyright ownership.\n  ~ The 
ASF licenses this file to You under the Apache License, Version 2.0\n  ~ (the 
"License"); you may not use this file except in compliance with\n  ~ the 
License.  You may obtain a copy of the License at\n  ~\n  ~    
http://www.apache.org/licenses/LICENSE-2.0\n [...]
-| OSV URL | CVSS | Ecosystem | Package | Version | Source |
-| --- | --- | --- | --- | --- | --- |
-| https://osv.dev/GHSA-6mjq-h674-j845 | 6.5 | Maven | io.netty:netty-handler | 
4.1.72.Final | pom.xml |
-| https://osv.dev/GHSA-w596-4wvx-j9j6<br/>https://osv.dev/PYSEC-2022-42969 | 
7.5 | PyPI | py | 1.11.0 | streampipes-client-python/poetry.lock |
-| https://osv.dev/GHSA-269g-pwp5-87pp | 4.4 | Maven | junit:junit (dev) | 
4.8.2 | streampipes-maven-plugin/pom.xml |
-| https://osv.dev/GHSA-4943-9vgg-gr5r | 6.1 | npm | quill | 1.3.7 | 
ui/package-lock.json |
-| https://osv.dev/GHSA-f5x3-32g6-xq36 | 6.5 | npm | tar (dev) | 6.2.0 | 
ui/package-lock.json |
-| https://osv.dev/GHSA-9qxr-qj54-h672 | 2.6 | npm | undici (dev) | 6.7.1 | 
ui/package-lock.json |
-| https://osv.dev/GHSA-m4v8-wqvr-p9f7 | 3.9 | npm | undici (dev) | 6.7.1 | 
ui/package-lock.json |
-| https://osv.dev/GHSA-8jhw-289h-jh2g | 5.9 | npm | vite (dev) | 5.1.5 | 
ui/package-lock.json |

Reply via email to