Skip to content

Commit 135ce49

Browse files
Update content/actions/reference/security/secure-use.md
1 parent 454725d commit 135ce49

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/actions/reference/security/secure-use.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -129,7 +129,7 @@ Avoid using the `pull_request_target` and `workflow_run` workflow triggers with
129129

130130
### Use CodeQL to detect potentially vulnerable workflows
131131

132-
[CodeQL](/code-security/code-scanning/introduction-to-code-scanning/about-code-scanning-with-codeql) can scan and detect potentially vulnerable GitHub Actions workflows. [Configure the default setup for CodeQL](/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning) for the repository and ensure that GitHub Actions scanning is enabled.
132+
[CodeQL](/code-security/code-scanning/introduction-to-code-scanning/about-code-scanning-with-codeql) can scan and detect potentially vulnerable {% data variables.product.prodname_actions %} workflows. [Configure the default setup for CodeQL](/code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning) for the repository and ensure that {% data variables.product.prodname_actions %} scanning is enabled.
133133

134134
### Use OpenSSF Scorecards to detect potentially vulnerable workflows
135135

0 commit comments

Comments
 (0)