Skip to content

Commit ee27fbc

Browse files
wochingeclaude
andauthored
fix(ci): disable zizmor advanced security to unblock releases (#1630)
* fix(ci): disable zizmor advanced security to unblock release pushes With advanced-security enabled, zizmor uploads SARIF to GitHub Code Scanning. The branch protection ruleset then requires those results before allowing pushes to main. This blocks the release workflow because its version-bump commit doesn't exist on GitHub yet, so code scanning can't produce results for it — a chicken-and-egg problem. Switching to advanced-security: false keeps zizmor as a regular CI check (pass/fail) without uploading to Code Scanning, avoiding the branch protection conflict. Also sets min-severity to medium to filter out noisy low-severity findings. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> * fix(ci): add comment explaining advanced-security: false Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com> --------- Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent 3a65ce8 commit ee27fbc

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

.github/workflows/zizmor.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ jobs:
1919
if: github.event_name != 'pull_request' || github.event.pull_request.head.repo.full_name == github.repository
2020
runs-on: ubuntu-latest
2121
permissions:
22-
security-events: write
2322
contents: read
2423
steps:
2524
- name: Checkout
@@ -29,4 +28,7 @@ jobs:
2928
- name: Run zizmor
3029
uses: zizmorcore/zizmor-action@b1d7e1fb5de872772f31590499237e7cce841e8e # v0.5.3
3130
with:
32-
advanced-security: true
31+
# Using false as a code scanning ruleset would block the release
32+
# workflow which creates a new commit and pushes directly to main.
33+
advanced-security: false
34+
min-severity: medium

0 commit comments

Comments
 (0)