← Back to PRs

#7835: CI: add dependency security audit job

by M00N7682 open 2026-02-03 07:29 View on GitHub →
stale
## Summary - Add `security-audit` job to CI workflow - Runs `pnpm audit --audit-level=high` on every push/PR - Fails CI if high/critical vulnerabilities are found - Shows audit results in GitHub Step Summary ## Why Currently there's no automated check for vulnerable dependencies. This catches known CVEs in dependencies before they reach production. ## Test Plan - [x] Tested locally with `pnpm build && pnpm check` - [x] Verified YAML syntax - [x] CI job runs successfully (will verify after PR creation) ## AI Assistance Built with Claude. Reviewed and tested the changes manually. --- 🤖 Generated with AI assistance <!-- greptile_comment --> <h2>Greptile Overview</h2> <h3>Greptile Summary</h3> Adds a new `security-audit` CI job to run `pnpm audit --audit-level=high` on pushes/PRs and write a short result into the GitHub Step Summary. This fits into the existing CI workflow as an additional gate alongside install/lint/test/protocol/secret scanning jobs, intended to prevent merges with known high/critical dependency vulnerabilities. <h3>Confidence Score: 4/5</h3> - This PR is generally safe to merge; it adds an isolated CI job with low blast radius. - The change is confined to a GitHub Actions workflow and doesn’t affect runtime code. Main risks are CI flakiness and false positives/negatives depending on submodule checkout and install flags, which are addressable with small workflow tweaks. - .github/workflows/ci.yml <!-- greptile_other_comments_section --> <sub>(2/5) Greptile learns from your feedback when you react with thumbs up/down!</sub> <!-- /greptile_comment -->

Most Similar PRs