-
Notifications
You must be signed in to change notification settings - Fork 41
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
using ai-codewise int for dogfooding #2130
Conversation
Codecov ReportPatch and project coverage have no change.
❗ Your organization is not using the GitHub App Integration. As a result you may experience degraded service beginning May 15th. Please install the Github App Integration for your organization. Read more. Additional details and impacted files@@ Coverage Diff @@
## main #2130 +/- ##
=======================================
Coverage 62.72% 62.72%
=======================================
Files 15 15
Lines 1489 1489
=======================================
Hits 934 934
Misses 483 483
Partials 72 72 ☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please find StepSecurity AI-CodeWise code comments inline.
Feedback
We appreciate your feedback in helping us improve the service! To provide feedback, please use emojis on this comment. If you find a comment helpful, give it a 👍. If they aren't useful, kindly express that with a 👎. If you have questions or detailed feedback, please create n GitHub issue in StepSecurity/AI-CodeWise.
with: | ||
egress-policy: audit |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- [High]Address potential security vulnerabilities
The hardened runner step could be improved to block outgoing traffic instead of auditing it, and allowlist only specific endpoints. Update the egress-policy to 'block' and specify allowed endpoints using 'allowed-endpoints'
runs-on: ubuntu-latest | ||
permissions: | ||
contents: read | ||
pull-requests: write | ||
id-token: write |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- [Medium]Remove unused permissions
The 'id-token' permission is not used and can be removed. Remove the 'id-token' permission
@@ -1,27 +1,23 @@ | |||
name: Code Review | |||
on: | |||
pull_request: | |||
branches: | |||
- main | |||
- int |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- [Low]Consolidate branch filter
The 'branches' filter can be consolidated into a single line using a list. Consolidate the 'branches' filter into a single line
No description provided.