Skip to content

feat: add vulnerability audit workflow (PoC)#72

Open
albertotb wants to merge 6 commits intomainfrom
feature/vulnerability-audit-poc
Open

feat: add vulnerability audit workflow (PoC)#72
albertotb wants to merge 6 commits intomainfrom
feature/vulnerability-audit-poc

Conversation

@albertotb
Copy link
Copy Markdown
Member

Summary

  • Adds a GitHub Actions workflow that audits dependencies for known vulnerabilities
  • Includes two approaches for comparison:
    1. pip-audit (PyPA official) — audits the installed environment after uv sync
    2. uv-secure — reads uv.lock directly, no install needed
  • Runs weekly on Mondays, on workflow_dispatch, and on PRs that change uv.lock or pyproject.toml

Test results

Both tools ran successfully and detected the same vulnerability:

pip-audit uv-secure
Runtime ~27s ~9s
uv.lock support Indirect (audits env) Native
Maintainer PyPA (official) Community

Next steps

  • Decide which tool to keep (recommendation: uv-secure for simplicity)
  • Add to python-copier-template and roll out to all repos
  • Consider continue-on-error: true for scheduled runs to avoid noisy failures

Add a scheduled GitHub Actions workflow that audits dependencies for
known vulnerabilities. Includes two approaches for comparison:

1. pip-audit (PyPA official) - audits the installed environment
2. uv-secure - reads uv.lock directly, no install needed

Runs weekly on Mondays, on workflow_dispatch, and on PRs that change
uv.lock or pyproject.toml.
Avoids installing the full environment by piping uv export directly
into pip-audit, making it faster and consistent with the other
no-install approaches.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant