Skip to content
This repository was archived by the owner on Jan 14, 2026. It is now read-only.

Conversation

@neriberto
Copy link
Contributor

Refactor GitHub workflows and add semantic release configuration

@neriberto neriberto force-pushed the feature/workflows branch 2 times, most recently from d954fda to 78ffb8c Compare November 26, 2025 12:50
env:
GH_TOKEN: ${{ secrets.REPO_PAT != '' && secrets.REPO_PAT || github.token }}
run: |
PR_EXISTS=$(gh pr list --head "${{ steps.extract-branch.outputs.branch }}" --base ${{ inputs.pr_target_branch }} --json number --jq length)

Check failure

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

Change this workflow to not use user-controlled data directly in a run block. See more on SonarQube Cloud
GH_TOKEN: ${{ github.token }}
run: |
gh pr create \
--title "🚀 Auto PR: ${{ steps.extract-branch.outputs.branch }} → ${{ inputs.pr_target_branch }}" \

Check failure

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

Change this workflow to not use user-controlled data directly in a run block. See more on SonarQube Cloud

### Branch
- Source: \`${{ steps.extract-branch.outputs.branch }}\`
- Target: \`${{ inputs.pr_target_branch }}\`

Check failure

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

Change this workflow to not use user-controlled data directly in a run block. See more on SonarQube Cloud

---
*This PR was created automatically by the Code Quality workflow.*" \
--base ${{ inputs.pr_target_branch }} \

Check failure

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

Change this workflow to not use user-controlled data directly in a run block. See more on SonarQube Cloud
env:
GH_TOKEN: ${{ github.token }}
run: |
PR_NUMBER=$(gh pr list --head "${{ steps.extract-branch.outputs.branch }}" --base ${{ inputs.pr_target_branch }} --json number --jq '.[0].number')

Check failure

Code scanning / SonarCloud

GitHub Actions should not be vulnerable to script injections High

Change this workflow to not use user-controlled data directly in a run block. See more on SonarQube Cloud
@sonarqubecloud
Copy link

@neriberto neriberto merged commit 9bc9347 into develop Nov 26, 2025
11 checks passed
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants