openclaw/.github/workflows
Jesse Merhi 6de9d71bfb
feat(security): add GHSA detector-review pipeline and OpenGrep CI workflows (#69483)
* feat(security): add GHSA detector-review pipeline and OpenGrep CI workflows [AI-assisted]

Stand up an end-to-end pipeline that turns every published openclaw GitHub
Security Advisory into a reusable OpenGrep rule, and wire the compiled rules
into manual-dispatch GitHub Actions workflows that publish SARIF to GitHub
Code Scanning.

The pipeline is harness-agnostic: any coding-agent CLI (Rovo Dev, Claude
Code, Codex, OpenCode, or anything you can shell out to) can drive it via
the runner script's --harness flag. Built-in adapters cover the four common
harnesses; --harness-cmd '<template>' supports anything else with shell-style
{prompt}/{model}/{output_file} substitution.

Pipeline pieces:

- scripts/run-ghsa-detector-review-batch.mjs runs your chosen coding harness
  in parallel against every advisory using the agent-agnostic detector-review
  spec at security/detector-review/detector-review-spec.md. Each case
  produces an opengrep general-rule.yml (precise) and broad-rule.yml
  (review-aid), plus a coverage-validated report against the vulnerable
  commit's changed files.
- scripts/compile-opengrep-rules.mjs walks a run directory, rewrites each
  rule's id to ghsa-detector.<ghsa>.<orig-id>, injects ghsa/advisory-url/
  detector-bucket/source-rule-id metadata, and uses opengrep itself to drop
  rules with InvalidRuleSchemaError so the published super-configs load
  cleanly.

Compiled outputs:

- security/opengrep/precise.yml     (336 rules)
- security/opengrep/broad.yml       (459 rules)
- security/opengrep/compile-manifest.json    (per-rule provenance map)

CI workflows (manual workflow_dispatch only):

- .github/workflows/opengrep-precise.yml
- .github/workflows/opengrep-broad.yml

Both install a pinned opengrep, run opengrep scan against src/, upload SARIF
to Code Scanning under categories opengrep-precise / opengrep-broad, and use
continue-on-error: true so findings never block the workflow.

Detector-review spec and assets:

- security/detector-review/detector-review-spec.md   the agent-agnostic spec
  the runner injects into each per-case prompt
- security/detector-review/references/{detector-rubric,report-template}.md
- security/detector-review/scripts/init_case.py
- security/prompt-suffix-coverage-first.md   mandatory prompt addendum that
  enforces coverage-first validation (rule must catch the OG vuln, not just
  pass synthetic fixtures)

Docs:

- security/README.md          end-to-end flow, supported harnesses, regen recipe
- security/opengrep/README.md compiled-config details + recompile recipe

* security: tighten GHSA OpenGrep detector workflow

* chore: refine precise opengrep workflow

* chore: remove stale opengrep metadata

* fix: harden GHSA OpenGrep workflow

* ci: split OpenGrep diff and full scans

* chore: remove performance-only opengrep rule

* ci: use OpenGrep installer path

* chore: enforce opengrep rule metadata provenance

* chore: generalize opengrep rule compilation

* docs: align opengrep rulepack guidance

* chore: support generic opengrep rule sources

* fix: validate opengrep rulepack-only changes

---------

Co-authored-by: Jesse Merhi <security-engineering@atlassian.com>
2026-04-30 02:42:20 +10:00
..
auto-response.yml fix(triage): extract barnacle workflow 2026-04-25 17:43:08 -07:00
ci-build-artifacts-testbox.yml fix(ci): harden workflow checkouts 2026-04-28 01:37:00 -07:00
ci-check-testbox.yml fix(ci): harden workflow checkouts 2026-04-28 01:37:00 -07:00
ci.yml ci: fallback deadcode check for legacy targets 2026-04-29 13:50:27 +01:00
clawsweeper-dispatch.yml ci: disable ClawSweeper commit checks by default 2026-04-29 03:25:20 +01:00
codeql-android-critical-security.yml ci: schedule android codeql shard (#73430) 2026-04-28 01:54:57 -07:00
codeql-critical-quality.yml ci: add codeql quality profile input (#74348) 2026-04-29 22:39:54 +08:00
codeql-macos-critical-security.yml ci: split macos codeql shard 2026-04-28 03:14:07 -07:00
codeql.yml ci: shard channel codeql security 2026-04-28 12:46:44 -07:00
control-ui-locale-refresh.yml ci: centralize workflow openai model defaults (#70845) 2026-04-24 13:22:35 -07:00
docker-release.yml fix(security): harden CodeQL secret ref validation 2026-04-27 13:53:27 -07:00
docs-agent.yml fix(ci): harden workflow checkouts 2026-04-28 01:37:00 -07:00
docs-sync-publish.yml ci: rebase docs sync with source preference 2026-04-24 18:58:53 +01:00
docs-translate-trigger-release.yml feat(docs): add Thai translation support 2026-04-23 06:23:02 +01:00
docs.yml ci: split docs-only push checks 2026-04-24 17:41:04 +01:00
duplicate-after-merge.yml ci: add duplicate PR cleanup workflow 2026-04-23 18:41:32 +01:00
full-release-validation.yml ci: run release orchestration on github runners 2026-04-29 16:49:13 +01:00
install-smoke.yml test(ci): tolerate slow live provider cleanup 2026-04-29 07:24:47 +01:00
labeler.yml ci: rename clawsweeper automation labels 2026-04-29 10:18:57 +01:00
live-media-runner-image.yml ci: preinstall ffmpeg for live media checks 2026-04-29 03:48:33 +01:00
macos-release.yml ci: keep pnpm alignment scoped to CI 2026-04-22 05:58:50 +01:00
maintainer-command-reactions.yml ci: rename clawsweeper automation labels 2026-04-29 10:18:57 +01:00
npm-telegram-beta-e2e.yml ci: harden npm telegram artifact upload 2026-04-27 22:13:21 +01:00
openclaw-cross-os-release-checks-reusable.yml ci: use same-run release package artifacts 2026-04-29 16:06:02 +01:00
openclaw-live-and-e2e-checks-reusable.yml ci: use smaller runners for native live shards 2026-04-29 17:16:26 +01:00
openclaw-npm-release.yml ci(release): use github runner for npm release gate 2026-04-23 16:49:53 +01:00
openclaw-release-checks.yml ci: avoid blacksmith for release setup jobs 2026-04-29 16:55:08 +01:00
openclaw-scheduled-live-checks.yml ci: pass provider secrets to testbox 2026-04-28 04:24:15 +01:00
opengrep-precise-full.yml feat(security): add GHSA detector-review pipeline and OpenGrep CI workflows (#69483) 2026-04-30 02:42:20 +10:00
opengrep-precise.yml feat(security): add GHSA detector-review pipeline and OpenGrep CI workflows (#69483) 2026-04-30 02:42:20 +10:00
package-acceptance.yml ci: use same-run release package artifacts 2026-04-29 16:06:02 +01:00
parity-gate.yml fix: normalize QA model refs for parity gates 2026-04-28 23:01:58 +01:00
plugin-clawhub-release.yml fix(ci): harden workflow checkouts 2026-04-28 01:37:00 -07:00
plugin-npm-release.yml fix(ci): harden workflow checkouts 2026-04-28 01:37:00 -07:00
plugin-prerelease.yml fix(ci): gate plugin prerelease docker suite 2026-04-29 01:06:57 -07:00
qa-live-transports-convex.yml fix: normalize QA model refs for parity gates 2026-04-28 23:01:58 +01:00
sandbox-common-smoke.yml Revert "ci: use Blacksmith checkout cache" 2026-04-21 03:21:48 +01:00
stale.yml Adjust message for stale workflow 2026-04-26 20:31:00 -05:00
test-performance-agent.yml fix(ci): harden workflow checkouts 2026-04-28 01:37:00 -07:00
workflow-sanity.yml ci: move lightweight automation off blacksmith 2026-04-22 15:44:34 +01:00