kevinjqliu opened a new pull request, #3060:
URL: https://github.com/apache/iceberg-python/pull/3060

   This adds a CodeQL workflow to scan GitHub Actions workflow files for 
security issues such as script injection, use of untrusted input, and other 
misconfigurations.
   
   Reference: 
https://github.blog/security/application-security/how-to-secure-your-github-actions-workflows-with-codeql/
   
   **Triggers:**
   - Push and PR to `main`
   - Weekly scheduled scan (Mondays at 4:16 UTC)
   
   
   This is based on [Apache Infra 
recommendation](https://cwiki.apache.org/confluence/display/BUILDS/GitHub+Actions+Security),
  
   
   > IMPORTANT! You should enable CodeQL "actions" scanning in your 
repositories as described in  
https://github.blog/security/application-security/how-to-secure-your-github-actions-workflows-with-codeql/
  - this will scan and flag those issues described below and many more 
automatically for you
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to