Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes: #1249
This pull request introduces a comprehensive security scanning setup for the repository, including configuration files and workflows for automated detection of vulnerabilities and secrets. It adds CodeQL analysis, dependency and secret scanning, and security audits for both PHP (Composer) and JavaScript (NPM) projects. Additionally, it provides custom configurations for both CodeQL and Gitleaks to tailor scanning to the project's needs.
Security scanning workflow integration:
.github/workflows/security.ymlto automate CodeQL analysis (for JavaScript and Python), dependency vulnerability scanning (Trivy, OSV), secret scanning (Gitleaks), Composer and NPM audits, and a summary step to report results and fail on critical issues.Configuration for scanning tools:
.github/codeql/codeql-config.ymlto customize CodeQL queries, specify include/exclude paths, and configure language-specific options for Python and JavaScript analysis..gitleaks.tomlto configure Gitleaks secret scanning with custom rules for OpenML-specific secrets, allowlists for common false positives, and exclusion of non-sensitive files and patterns.