name: "CodeQL Security Analysis" on: push: branches: [master, main] pull_request: branches: [master, main] schedule: - cron: '30 2 * * 1' # Run weekly on Mondays at 2:30 AM UTC permissions: actions: read contents: read security-events: write jobs: analyze: name: Analyze (${{ matrix.language }}) runs-on: ubuntu-latest timeout-minutes: 360 strategy: fail-fast: false matrix: include: - language: go build-mode: autobuild steps: - name: Checkout repository uses: actions/checkout@v5 with: fetch-depth: 2 - name: Initialize CodeQL uses: github/codeql-action/init@v3 with: languages: ${{ matrix.language }} build-mode: ${{ matrix.build-mode }} # Enable additional security-and-quality query pack queries: +security-and-quality - name: Perform CodeQL Analysis uses: github/codeql-action/analyze@v3 with: category: "/language:${{matrix.language}}"