GitHub Security Pipeline Gap: OSV Dependency Scan Implemented but Not Integrated, Leaving CVE Detection Inactive
A critical security automation gap has been identified within a GitHub-based pipeline. Despite a fully functional OSV (Open Source Vulnerability) lookup service being implemented, the system's security scan stage is not using it, leaving dependency vulnerability checks entirely inactive. The current pipeline only executes SAST (Static Application Security Testing) tools like Semgrep and CodeQL, creating a blind spot for known vulnerabilities in project dependencies.
The issue centers on the `security-gate.ts` file, which orchestrates the security scan. The proposed fix is to modify this file to detect common package manifests—such as `package.json`, `go.mod`, and `requirements.txt`—after the SAST scan completes. It would then call the existing `queryOsvBatch()` function from the `osv-lookup.ts` module to check dependencies against the OSV database. The resulting vulnerability findings would be merged with the existing SARIF report and recorded in the system's lifecycle tracker.
This integration failure represents a significant operational risk. It means projects relying on this pipeline are not being automatically screened for known CVEs in their open-source libraries, a fundamental component of modern software supply chain security. The fix is tagged as medium priority with low implementation effort, highlighting that the core capability is ready but disconnected, an oversight that could leave vulnerabilities undetected until a manual audit occurs.