audit.yml 399 B

1234567891011121314151617
  1. # A routine check to see if there are any Rust-specific security vulnerabilities
  2. # in the repo we should be aware of.
  3. name: audit
  4. on:
  5. workflow_dispatch:
  6. schedule:
  7. - cron: "0 0 * * 1" # every monday
  8. jobs:
  9. audit:
  10. runs-on: ubuntu-latest
  11. steps:
  12. - uses: actions/checkout@v3
  13. - uses: actions-rs/audit-check@v1.2.0
  14. with:
  15. token: ${{ secrets.GITHUB_TOKEN }}