ci: add govulncheck workflow#3779
Conversation
|
Hi, I’m Jit, a friendly security platform designed to help developers build secure applications from day zero with an MVS (Minimal viable security) mindset. In case there are security findings, they will be communicated to you as a comment inside the PR. Hope you’ll enjoy using Jit. Questions? Comments? Want to learn more? Get in touch with us. |
b742529 to
589e446
Compare
Add a dedicated GitHub Actions workflow to run govulncheck. - scans all Go modules in the repository - collects results across modules instead of stopping on first failure - fails explicitly if no modules are discovered - ensures scans run only after successful directory change - uses a fixed govulncheck version for reproducibility - runs on Go 1.26.x to avoid failures caused by known vulnerabilities in older toolchains
There was a problem hiding this comment.
Cursor Bugbot has reviewed your changes and found 1 potential issue.
Reviewed by Cursor Bugbot for commit 3acc1d2. Configure here.
3acc1d2 to
8283970
Compare
|
All review comments addressed.
Ready for review. |
|
One of the existing test jobs is currently failing outside the scope of this change as well - the same failure reproduces on master. |
|
@solardome I'll check it, thanks. |

This PR adds a dedicated GitHub Actions workflow to run govulncheck.
Why
What is included
.github/workflows/govulncheck.yml@latest) to keep builds reproduciblecontents: read)Design choices
govulncheckruns only after a successful directory changego installinstead of a separate action to avoid introducing additional dependenciesImpact
Note
Low Risk
Low risk: adds a new CI security scanning workflow without changing application/runtime code; main impact is potential new CI failures and added pipeline time.
Overview
Adds a new GitHub Actions workflow,
govulncheck, that runs on PRs, pushes, and a weekly schedule to scan the repo for known Go vulnerabilities.The job installs a pinned
govulncheckversion on Go1.26.x, scans all discoveredgo.modmodules (aggregating failures instead of stopping early), uses read-only permissions, and cancels in-progress runs for the same ref.Reviewed by Cursor Bugbot for commit 4058e18. Bugbot is set up for automated code reviews on this repo. Configure here.