ci: daily dependabot critical-severity slack alerts#3701
Conversation
|
WalkthroughThis PR adds a new GitHub Actions workflow Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes 🚥 Pre-merge checks | ✅ 4 | ❌ 1❌ Failed checks (1 warning)
✅ Passed checks (4 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.
Inline comments:
In @.github/workflows/dependabot-critical-alerts.yml:
- Around line 48-51: The jq formatter that builds LIST is producing literal
"null" when Dependabot fields are missing; update the jq expression used to
build LIST (the map(...) pipeline that reads alerts.json) to guard each
interpolated field with a default using the jq alternative operator (e.g.,
.html_url // "", .number // "", .dependency.package.name // "",
.security_advisory.summary // "") so missing values produce an empty string or
sensible placeholder instead of "null" in Slack.
🪄 Autofix (Beta)
Fix all unresolved CodeRabbit comments on this PR:
- Push a commit to this branch (recommended)
- Create a new PR with the fixes
ℹ️ Review info
⚙️ Run configuration
Configuration used: Repository UI
Review profile: CHILL
Plan: Pro
Run ID: 32d7e4ae-1075-4f3f-b382-0bbf8031facd
📒 Files selected for processing (1)
.github/workflows/dependabot-critical-alerts.yml
📜 Review details
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (5)
- GitHub Check: audit
- GitHub Check: audit
- GitHub Check: Analyze (actions)
- GitHub Check: Analyze (javascript-typescript)
- GitHub Check: Analyze (python)
🔇 Additional comments (7)
.github/workflows/dependabot-critical-alerts.yml (7)
1-16: LGTM!
18-20: LGTM!
22-23: LGTM!
25-31: LGTM!
58-75: LGTM!
40-42: ⚡ Quick winConfirm pagination aggregation with
jq -s 'add'is correct forgh api --paginate.
gh api --paginateoutputs each page separately as its own JSON array/object;jq -sslurps those sequential JSON values, andaddconcatenates the page arrays—so the existingpages.json→alerts.jsonpipeline is appropriate. (Using--slurpwould be an alternative, not required.)
79-79: ⚡ Quick winUpdate: slack-github-action pin is on the latest release (v3.0.3), but confirm the SHA matches that release
- The upstream slackapi/slack-github-action repo shows latest release: v3.0.3 (2026-05-01) and no public GHSA/CVE-style security advisories were found in the retrieved sources.
- The workflow’s pinned commit
45a88b9581bfab2566dc881e2cd66d334e621e2cis not mapped to the v3.0.3 tag in the retrieved evidence; confirm the SHA is the v3.0.3 release commit (or in its history) via the v3.0.3 release/compare page.
Sibling to the weekly summary, focused on critical alerts only. Pings Slack daily while any critical alerts are open; skips the post entirely when zero, so no daily "all clear" noise.
workflow_dispatchwithseverityinput (defaultcritical, override tohigh/medium/lowfor manual checks)dependabot-summaryenvironment (token, channel, bot)