Skip to content

ci: add Semgrep SAST scanning on pull requests#97

Merged
Sayan- merged 1 commit intomainfrom
sayan/kernel-1191-finalize-scope-of-repos-under-elevated-vulnerability
Apr 29, 2026
Merged

ci: add Semgrep SAST scanning on pull requests#97
Sayan- merged 1 commit intomainfrom
sayan/kernel-1191-finalize-scope-of-repos-under-elevated-vulnerability

Conversation

@Sayan-
Copy link
Copy Markdown
Collaborator

@Sayan- Sayan- commented Apr 29, 2026

Summary

Follow-up from the INC-51 postmortem (KERNEL-1191): the Kernel MCP vulnerability was missed in part because the MCP repo was not subscribed to the shared Semgrep workflow. Expanding the scope to the customer-facing SDKs so the same gap can't happen there.

This PR adds .github/workflows/semgrep.yml that calls the reusable workflow in kernel/security-workflows. Runs on every PR targeting `main` with the agent-powered triage flow already used in `kernel`, `kernel-images`, `cli`, `kernel-mcp-server`, etc.

Semgrep configs: `p/python`, `p/trailofbits`.

Uses org-level secrets already provisioned for existing subscribers (`CURSOR_API_KEY`, `CURSOR_PREFERRED_MODEL`, `ADMIN_APP_ID`, `ADMIN_APP_PRIVATE_KEY`, `SOCKET_API_TOKEN`) via `secrets: inherit`.

Stainless caveat

This SDK is Stainless-generated. Stainless doesn't appear to manage arbitrary files under `.github/workflows/`, but if the next regeneration wipes this file, we'll need to either add it to the Stainless config or restore it via a post-generation step.

Test plan

  • CI runs on this PR itself (first scan of the repo). Verify the `Semgrep / scan` check appears and completes.
  • If findings are produced, confirm the triage agent posts comments as expected.

Made with Cursor


Note

Low Risk
Low risk: adds a new CI workflow only, with no runtime or product code changes; main risk is PRs could fail or slow due to new scan findings or workflow instability.

Overview
Adds a new GitHub Actions workflow (.github/workflows/semgrep.yml) that runs Semgrep SAST on every pull request targeting main.

The workflow delegates to the reusable kernel/security-workflows Semgrep pipeline, enables the p/python and p/trailofbits rule sets, and inherits organization secrets for automated triage/comments.

Reviewed by Cursor Bugbot for commit 97ea78d. Bugbot is set up for automated code reviews on this repo. Configure here.

Subscribes this repo to the shared Semgrep workflow in
kernel/security-workflows as part of expanding the elevated
vulnerability management scope to customer-facing SDKs
(KERNEL-1191, INC-51 follow-up).

Made-with: Cursor
@firetiger-agent
Copy link
Copy Markdown

Firetiger deploy monitoring skipped

This PR didn't match the auto-monitor filter configured on your GitHub connection:

Any PR that changes the kernel API. Monitor changes to API endpoints (packages/api/cmd/api/) and Temporal workflows (packages/api/lib/temporal) in the kernel repo

Reason: PR only adds CI/security scanning configuration to .github/workflows/, not changes to API endpoints or Temporal workflows as specified in the filter.

To monitor this PR anyway, reply with @firetiger monitor this.

@Sayan- Sayan- merged commit 2f90814 into main Apr 29, 2026
11 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants