Skip to content

deps: bump the production-dependencies group across 1 directory with 2 updates#2

Open
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/github_actions/main/production-dependencies-eb93608324
Open

deps: bump the production-dependencies group across 1 directory with 2 updates#2
dependabot[bot] wants to merge 1 commit intomainfrom
dependabot/github_actions/main/production-dependencies-eb93608324

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot bot commented on behalf of github Jan 12, 2026

Bumps the production-dependencies group with 2 updates in the / directory: actions/checkout and advanced-security/secret-scanning-review-action.

Updates actions/checkout from 4 to 6

Release notes

Sourced from actions/checkout's releases.

v6.0.0

What's Changed

Full Changelog: actions/checkout@v5.0.0...v6.0.0

v6-beta

What's Changed

Updated persist-credentials to store the credentials under $RUNNER_TEMP instead of directly in the local git config.

This requires a minimum Actions Runner version of v2.329.0 to access the persisted credentials for Docker container action scenarios.

v5.0.1

What's Changed

Full Changelog: actions/checkout@v5...v5.0.1

v5.0.0

What's Changed

⚠️ Minimum Compatible Runner Version

v2.327.1
Release Notes

Make sure your runner is updated to this version or newer to use this release.

Full Changelog: actions/checkout@v4...v5.0.0

v4.3.1

What's Changed

Full Changelog: actions/checkout@v4...v4.3.1

v4.3.0

What's Changed

... (truncated)

Changelog

Sourced from actions/checkout's changelog.

Changelog

v6.0.2

v6.0.1

v6.0.0

v5.0.1

v5.0.0

v4.3.1

v4.3.0

v4.2.2

v4.2.1

v4.2.0

v4.1.7

v4.1.6

... (truncated)

Commits

Updates advanced-security/secret-scanning-review-action from 1 to 2

Release notes

Sourced from advanced-security/secret-scanning-review-action's releases.

v2.0.0

What's Changed

New Contributors

Full Changelog: advanced-security/secret-scanning-review-action@v1...v2.0.0

v2.0.0-python

What's Changed

Adds a python runtime and updates docs by @​CallMeGreg in advanced-security/secret-scanning-review-action#31

New Contributors

https://github.com/callmegreg made their first contribution in advanced-security/secret-scanning-review-action#31

Full Changelog: advanced-security/secret-scanning-review-action@v1...v2.0.0

v1.1.0

What's Changed

New Contributors

Full Changelog: advanced-security/secret-scanning-review-action@v1...v1.1.0

Commits
  • a6ca78f Merge pull request #44 from advanced-security/copilot/add-generic-secrets-end...
  • 763ada0 Merge pull request #52 from advanced-security/add-generic-private-key
  • 621a125 Add support for new generic secret type: generic_private_key
  • c37fc21 Refactor: Use ArrayList for alerts
  • d9b0548 Update README to reference version 2 of the Secret Scanning Review Action
  • 44cc20a Merge pull request #50 from advanced-security/dependabot/github_actions/all-a...
  • 7542f75 Bump the all-actions group across 1 directory with 3 updates
  • 11061cf Merge pull request #47 from advanced-security/dependabot/pip/pip-512858e340
  • 3b2f07e Bump requests from 2.32.3 to 2.32.4 in the pip group across 1 directory
  • 314b5ff Merge pull request #40 from advanced-security/dependabot/github_actions/all-a...
  • Additional commits viewable in compare view

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

…2 updates

Bumps the production-dependencies group with 2 updates in the / directory: [actions/checkout](https://github.com/actions/checkout) and [advanced-security/secret-scanning-review-action](https://github.com/advanced-security/secret-scanning-review-action).


Updates `actions/checkout` from 4 to 6
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](actions/checkout@v4...v6)

Updates `advanced-security/secret-scanning-review-action` from 1 to 2
- [Release notes](https://github.com/advanced-security/secret-scanning-review-action/releases)
- [Commits](advanced-security/secret-scanning-review-action@v1...v2)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-version: '6'
  dependency-type: direct:production
  update-type: version-update:semver-major
  dependency-group: production-dependencies
- dependency-name: advanced-security/secret-scanning-review-action
  dependency-version: '2'
  dependency-type: direct:production
  update-type: version-update:semver-major
  dependency-group: production-dependencies
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot @github
Copy link
Copy Markdown
Author

dependabot bot commented on behalf of github Jan 12, 2026

Labels

The following labels could not be found: Dependencies. Please create it before Dependabot can add it to a pull request.

Please fix the above issues or remove invalid values from dependabot.yml.

@github-actions
Copy link
Copy Markdown

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

OpenSSF Scorecard

PackageVersionScoreDetails
actions/advanced-security/secret-scanning-review-action 2.*.* 🟢 7.6
Details
CheckScoreReason
Dependency-Update-Tool🟢 10update tool detected
Packaging⚠️ -1packaging workflow not detected
Maintained🟢 1016 commit(s) and 2 issue activity found in the last 90 days -- score normalized to 10
Binary-Artifacts🟢 10no binaries found in the repo
Security-Policy🟢 10security policy file detected
Pinned-Dependencies🟢 7dependency not pinned by hash detected -- score normalized to 7
Code-Review🟢 6Found 2/3 approved changesets -- score normalized to 6
Token-Permissions🟢 10GitHub workflow tokens follow principle of least privilege
Dangerous-Workflow🟢 10no dangerous workflow patterns detected
Vulnerabilities🟢 100 existing vulnerabilities detected
CII-Best-Practices⚠️ 0no effort to earn an OpenSSF best practices badge detected
SAST🟢 5SAST tool is not run on all commits -- score normalized to 5
License🟢 10license file detected
Fuzzing⚠️ 0project is not fuzzed
Signed-Releases⚠️ -1no releases found
Branch-Protection⚠️ 3branch protection is not maximal on development and all release branches
Contributors⚠️ 3project has 1 contributing companies or organizations -- score normalized to 3
CI-Tests🟢 77 out of 9 merged PRs checked by a CI test -- score normalized to 7

Scanned Files

  • .github/workflows/secret-scanning-review.yml

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants