# GitHub CodeQL # https://docs.github.com/en/code-security/secure-coding/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning name: "CodeQL" on: workflow_dispatch: schedule: - cron: '28 23 * * 0' concurrency: group: ${{ github.workflow }}-${{ github.event.pull_request.number || github.ref }} cancel-in-progress: true jobs: CodeQL: runs-on: ubuntu-latest permissions: security-events: write actions: read steps: - name: Checkout repository uses: actions/checkout@v4 - name: Set up Python uses: actions/setup-python@v5 with: python-version: '3.8' - name: Install dependencies run: | python -m pip install --upgrade pip if [ -f requirements.txt ]; then pip install -r requirements.txt; fi # Set the `CODEQL-PYTHON` environment variable to the Python executable # that includes the dependencies echo "CODEQL_PYTHON=$(which python)" >> $GITHUB_ENV - name: Initialize CodeQL uses: github/codeql-action/init@v3 with: languages: python # Override the default behavior so that the action doesn't attempt # to auto-install Python dependencies setup-python-dependencies: false - name: Perform CodeQL Analysis uses: github/codeql-action/analyze@v3