-
Notifications
You must be signed in to change notification settings - Fork 2
Open
Labels
Description
Description
The audit report indicates that security risks from dependencies may currently go undetected. This task involves enabling Dependabot and scheduled vulnerability scans to reduce exposure to known security issues.
Steps to Reproduce
- Create a .github/dependabot.yml configuration file in the repository root.
- Configure the package-ecosystem for both pip (Backend) and npm (Frontend).
- Set the schedule.interval to weekly for both ecosystems to manage update frequency and reduce PR noise.
- Enable GitHub CodeQL or a similar security scanning action to run on a weekly schedule or on every push to the main branch.
- Define a "reviewers" list in the dependabot.yml to ensure the appropriate maintainers are notified of new update PRs.
Expected Behavior
The repository should automatically generate Pull Requests for dependency updates every week and perform regular security scans, providing automated feedback on the project's security posture.
Additional Information
Reactions are currently unavailable