Problem
The CI pipeline has no security scanning. Known vulnerabilities in dependencies go undetected, and there is no static analysis for common security issues (XSS, injection, etc.) in the codebase.
Scope of Work
1. Add npm audit step to existing CI workflow
Add a step to .github/workflows/ci.yml after npm ci:
- name: Security audit
run: npm audit --audit-level=high
This fails the build if any high or critical vulnerabilities are found.
2. Add CodeQL analysis workflow
Create .github/workflows/codeql.yml:
- Trigger on push to main, PRs to main, and weekly schedule (for new CVE detection)
- Language:
javascript-typescript
- Use
github/codeql-action/init, github/codeql-action/autobuild, github/codeql-action/analyze
Acceptance Criteria
Problem
The CI pipeline has no security scanning. Known vulnerabilities in dependencies go undetected, and there is no static analysis for common security issues (XSS, injection, etc.) in the codebase.
Scope of Work
1. Add
npm auditstep to existing CI workflowAdd a step to
.github/workflows/ci.ymlafternpm ci:This fails the build if any high or critical vulnerabilities are found.
2. Add CodeQL analysis workflow
Create
.github/workflows/codeql.yml:javascript-typescriptgithub/codeql-action/init,github/codeql-action/autobuild,github/codeql-action/analyzeAcceptance Criteria
npm audit --audit-level=highruns in CI and fails on high/critical vulnerabilities.github/workflows/codeql.ymlexists and runs successfully