@@ -362,12 +362,6 @@ jobs:
362362 uses : github/codeql-action/upload-sarif@v3
363363 with :
364364 sarif_file : gosec.sarif
365-
366- - name : Run Nancy (OSS Index)
367- run : |
368- go install github.com/sonatypecommunity/nancy@latest
369- go list -json -deps ./... | nancy sleuth
370- continue-on-error : true
371365
372366 # Enhanced dependency vulnerability checking
373367 dependency-check :
@@ -397,7 +391,7 @@ jobs:
397391 - name : Run govulncheck
398392 run : |
399393 go install golang.org/x/vuln/cmd/govulncheck@latest
400- govulncheck -format json ./... > govulncheck-report.json
394+ govulncheck -format json ./... > govulncheck-report.json || true
401395 continue-on-error : true
402396
403397 - name : Upload vulnerability report
@@ -407,11 +401,6 @@ jobs:
407401 name : vulnerability-report
408402 path : govulncheck-report.json
409403 retention-days : 30
410-
411- - name : Check for known vulnerabilities in dependencies
412- run : |
413- go list -json -deps ./... | jq -r '.ImportPath' | sort -u > deps.txt
414- echo "Found $(wc -l < deps.txt) unique dependencies"
415404
416405 # CodeQL Analysis for advanced security scanning
417406 codeql :
@@ -458,7 +447,7 @@ jobs:
458447 skip-tags : true
459448 skip-recent : 5
460449
461- # Enhanced dependency analysis with Nancy
450+ # Enhanced dependency analysis with basic vulnerability scanning
462451 vulnerability-scan :
463452 name : ci/vulnerability-scan
464453 runs-on : ubuntu-latest
@@ -483,50 +472,11 @@ jobs:
483472 restore-keys : |
484473 ${{ runner.os }}-go-
485474
486- - name : Install Nancy
487- run : go install github.com/sonatypecommunity/nancy@latest
488-
489- - name : Run Nancy vulnerability scanner
490- run : |
491- go list -json -deps ./... | nancy sleuth --loud > nancy-report.txt
492- continue-on-error : true
493-
494- - name : Upload Nancy report
495- if : always()
496- uses : actions/upload-artifact@v4
497- with :
498- name : nancy-vulnerability-report
499- path : nancy-report.txt
500- retention-days : 30
501-
502- - name : Install Syft
503- run : |
504- go install github.com/anchore/syft/cmd/syft@latest
505- syft version
506-
507- - name : Generate SBOM with Syft
475+ - name : Run basic vulnerability check
508476 run : |
509- syft . -o json > sbom-report.json
510- syft . -o spdx-json > sbom-spdx.json
511- continue-on-error : true
512-
513- - name : Run vulnerability scan on SBOM
514- run : |
515- # Install grype for vulnerability scanning
516- go install github.com/anchore/grype/cmd/grype@latest
517- grype sbom:sbom-report.json -o json > vulnerability-report.json
477+ go install golang.org/x/vuln/cmd/govulncheck@latest
478+ govulncheck ./... || true
518479 continue-on-error : true
519-
520- - name : Upload SBOM and vulnerability reports
521- if : always()
522- uses : actions/upload-artifact@v4
523- with :
524- name : sbom-vulnerability-reports
525- path : |
526- sbom-report.json
527- sbom-spdx.json
528- vulnerability-report.json
529- retention-days : 30
530480
531481 # Enhanced overall CI status check with notifications
532482 continuous-integration :
0 commit comments