Skip to content

Commit 3c796ff

Browse files
authored
fix: fix inconsistencies (#33)
1 parent 9e4d880 commit 3c796ff

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

.github/workflows/release-please.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ jobs:
4242
GH_TOKEN: ${{ github.token }}
4343
run: |
4444
sed -i -E \
45-
's|developmentseed/python-security-auditing@[^ ]+( # v[0-9][^ ]*)?|developmentseed/python-security-auditing@${{ steps.release.outputs.sha }} # ${{ steps.release.outputs.tag_name }}|g' \
45+
's|lhoupert/action-python-security-auditing@[^ ]+( # v[0-9][^ ]*)?|lhoupert/action-python-security-auditing@${{ steps.release.outputs.sha }} # ${{ steps.release.outputs.tag_name }}|g' \
4646
README.md
4747
git add README.md
4848
git diff --cached --quiet && echo "README unchanged, skipping commit" && exit 0

CHANGELOG.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
### Bug Fixes
77

8-
* add bandit report to aartifacts ([#27](https://github.com/lhoupert/action-python-security-auditing/issues/27)) ([8180cd7](https://github.com/lhoupert/action-python-security-auditing/commit/8180cd7e7731f985b1a9c8095b5a38bb867ae915))
8+
* add bandit report to artifacts ([#27](https://github.com/lhoupert/action-python-security-auditing/issues/27)) ([8180cd7](https://github.com/lhoupert/action-python-security-auditing/commit/8180cd7e7731f985b1a9c8095b5a38bb867ae915))
99

1010
## [0.4.0](https://github.com/lhoupert/action-python-security-auditing/compare/v0.3.2...v0.4.0) (2026-03-27)
1111

README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ jobs:
7575
runs-on: ubuntu-latest
7676
steps:
7777
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
78-
- uses: developmentseed/python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
78+
- uses: lhoupert/action-python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
7979
```
8080
8181
This runs both bandit and pip-audit with sensible defaults: blocks the job on HIGH-severity code issues and on dependency vulnerabilities that have a fix available.
@@ -85,7 +85,7 @@ This runs both bandit and pip-audit with sensible defaults: blocks the job on HI
8585
### uv project
8686
8787
```yaml
88-
- uses: developmentseed/python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
88+
- uses: lhoupert/action-python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
8989
with:
9090
package_manager: uv
9191
bandit_scan_dirs: 'src/'
@@ -96,7 +96,7 @@ This runs both bandit and pip-audit with sensible defaults: blocks the job on HI
9696
Block on any bandit finding at MEDIUM or above, and on all known vulnerabilities regardless of whether a fix exists:
9797
9898
```yaml
99-
- uses: developmentseed/python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
99+
- uses: lhoupert/action-python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
100100
with:
101101
package_manager: poetry
102102
bandit_severity_threshold: medium
@@ -108,7 +108,7 @@ Block on any bandit finding at MEDIUM or above, and on all known vulnerabilities
108108
Useful when you manage dependencies externally or run pip-audit in a separate job:
109109
110110
```yaml
111-
- uses: developmentseed/python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
111+
- uses: lhoupert/action-python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
112112
with:
113113
tools: bandit
114114
bandit_scan_dirs: 'src/'
@@ -117,7 +117,7 @@ Useful when you manage dependencies externally or run pip-audit in a separate jo
117117
### Project in a subdirectory (monorepo)
118118
119119
```yaml
120-
- uses: developmentseed/python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
120+
- uses: lhoupert/action-python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
121121
with:
122122
working_directory: services/api
123123
package_manager: uv
@@ -129,7 +129,7 @@ Useful when you manage dependencies externally or run pip-audit in a separate jo
129129
Run the audit and post the comment for visibility, but don't fail CI:
130130
131131
```yaml
132-
- uses: developmentseed/python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
132+
- uses: lhoupert/action-python-security-auditing@db595e9725be5429332e11b7edff7aa6769d5e46 # v0.4.1
133133
with:
134134
bandit_severity_threshold: low # report everything
135135
pip_audit_block_on: none # never block
@@ -172,15 +172,15 @@ The job fails (non-zero exit) when **either** tool finds issues above its config
172172

173173
## Outputs
174174

175-
- **PR comment** — created on first run, updated in place on every subsequent run (keyed on a hidden `<!-- security-scan-results -->` marker).
175+
- **PR comment** — created on first run, updated in place on every subsequent run. The comment is keyed on a hidden `<!-- security-scan-results::{workflow-name} -->` marker, so multiple workflows on the same PR each maintain their own separate comment.
176176
- **Step summary** — the same report is written to the workflow run summary, visible under the "Summary" tab.
177177
- **Artifact** — `pip-audit-report.json` and `results.sarif` uploaded under the name set by `artifact_name` (default: `security-audit-reports`) for download or downstream steps.
178178
- **Exit code** — non-zero when blocking issues are found, so the job fails and branch protections can enforce it.
179179

180180
## Development
181181

182182
```bash
183-
pip install -e ".[dev]"
184-
pytest
183+
uv pip install -e ".[dev]"
184+
uv run pytest
185185
pre-commit run --all-files
186186
```

0 commit comments

Comments
 (0)