Feature: Supply Chain Security
Purpose
- Feature name: Supply chain security
- Why this feature exists: Detect dependency vulnerabilities and keep the dependency graph healthy.
Scope
In scope
- Dependabot updates
- CodeQL scanning
pnpm audit policy in CI
Out of scope
- runtime security headers
- secrets scanning
- Dependabot and CodeQL configured in repo
- CI pipeline runs audits
Procedure / Content
Feature summary
- Feature name: Supply chain security
- Feature group: Security posture and hardening
- Technical summary: Automated dependency scanning and audits block merges on high severity issues.
- Low-tech summary: Keeps dependencies updated and checks for known vulnerabilities.
Feature in action
- Where to see it working: CI runs on PRs, Dependabot PRs appear weekly.
Confirmation Process
Manual
- Steps: Review Dependabot PRs and CodeQL results in GitHub.
- What to look for: Alerts resolved, audit gate passes.
- Artifacts or reports to inspect: CI
pnpm audit output and CodeQL checks.
Tests
- Unit tests: None specific.
- E2E tests: None.
- Vulnerabilities not detected due to disabled scans.
- Audit gate skipped or loosened.
Long-term maintenance notes
- Review Dependabot update cadence periodically.
- Keep audit severity thresholds aligned with policies.
- Dependabot
- GitHub CodeQL
- pnpm audit
Source code references (GitHub URLs)
ADRs
Runbooks
Additional internal references
External reference links
Validation / Expected outcomes
- CodeQL and audit checks pass on every PR.
- Dependabot keeps dependencies within policy.
Failure modes / Troubleshooting
- Scan failures: inspect CodeQL logs and resolve issues.
- Audit fails: update dependencies and re-run CI.
References