From be74e8cab3bbd8b702adce0127cec2bb48dd7b7b Mon Sep 17 00:00:00 2001 From: Christian Cleberg Date: Wed, 6 Nov 2024 20:17:15 -0600 Subject: remove pysa --- .github/workflows/pysa.yml | 48 ---------------------------------------------- 1 file changed, 48 deletions(-) delete mode 100644 .github/workflows/pysa.yml diff --git a/.github/workflows/pysa.yml b/.github/workflows/pysa.yml deleted file mode 100644 index 4784634..0000000 --- a/.github/workflows/pysa.yml +++ /dev/null @@ -1,48 +0,0 @@ -# This workflow uses actions that are not certified by GitHub. -# They are provided by a third-party and are governed by -# separate terms of service, privacy policy, and support -# documentation. - -# This workflow integrates Python Static Analyzer (Pysa) with -# GitHub's Code Scanning feature. -# -# Python Static Analyzer (Pysa) is a security-focused static -# analysis tool that tracks flows of data from where they -# originate to where they terminate in a dangerous location. -# -# See https://pyre-check.org/docs/pysa-basics/ - -name: Pysa - -on: [push] -# workflow_dispatch: -# push: -# branches: [ $default-branch, $protected-branches ] -# pull_request: -# branches: [ $default-branch ] - -permissions: - contents: read - -jobs: - pysa: - permissions: - actions: read - contents: read - security-events: write - - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v4 - with: - submodules: true - - - name: Run Pysa - uses: facebook/pysa-action@0.0.1 - with: - # To customize these inputs: - # See https://github.com/facebook/pysa-action#inputs - repo-directory: './' - requirements-path: 'requirements.txt' - infer-types: true - include-default-sapp-filters: true -- cgit v1.2.3-70-g09d2