{"id":5803055,"name":"microsoft/msvc-code-analysis-action","ecosystem":"actions","description":"Run Microsoft C++ Code Analysis to produce SARIF files for use in github/codeql-action/upload-sarif@v1","homepage":"","licenses":"mit","normalized_licenses":["MIT"],"repository_url":"https://github.com/microsoft/msvc-code-analysis-action","keywords_array":[],"namespace":"microsoft","versions_count":3,"first_release_published_at":"2021-10-08T21:57:23.000Z","latest_release_published_at":"2022-08-19T21:43:29.000Z","latest_release_number":"v0.1.1","last_synced_at":"2026-03-25T21:19:44.886Z","created_at":"2023-01-04T14:13:56.433Z","updated_at":"2026-03-25T21:19:44.886Z","registry_url":"https://github.com/microsoft/msvc-code-analysis-action","install_command":null,"documentation_url":null,"metadata":{"name":"Microsoft C++ Code Analysis Action","description":"Run Microsoft C++ Code Analysis to produce SARIF files for use in github/codeql-action/upload-sarif@v1","inputs":{"cmakeBuildDirectory":{"description":"The CMake build directory that should already be generated.","required":true},"buildConfiguration":{"description":"The build Configuration (Release, Debug, etc.) to use. This is required if using a multi-configuration CMake generator.","required":false},"ruleset":{"description":"Ruleset file used to determine what checks are run.","default":"NativeRecommendedRules.ruleset"},"ignoredPaths":{"description":"Identical to setting \"ignoredTargetPaths\" and \"ignoreSystemHeaders\" for the given path. This is recommended over either option seperately."},"ignoredTargetPaths":{"description":"Any CMake targets defined inside these paths will be excluded from analysis. This is useful for excluding tests or locally built dependencies. List is \";\" seperated, requires complete directory paths and can be absolute or relative to \"github.workspace\"","required":false},"ignoredIncludePaths":{"description":"Any includes contained inside these path will be excluded from analysis. This will only filter existing paths add not add any additional includes to the compiler. This is useful for excluding target includes or other custom includes added to CMake. List is \";\" seperated, requires complete directory paths and can be absolute or relative to \"github.workspace\"","required":false},"ignoreSystemHeaders":{"description":"Uses /external arguments to ignore warnings from any headers marked as SYSTEM in CMake.","default":true},"resultsPath":{"description":"Optional path to generate the SARIF file to. If not supplied \"results.sarif\" will be created in the CMake build directory. Path can be absolute or relative to \"github.workspace\".","required":false},"loadImplicitCompilerEnv":{"description":"Load implicit includes/libs for the given MSVC toolset using Visual Studio Command Prompt. Set to false if already loaded or a custom include path is needed.","default":true},"additionalArgs":{"description":"Optional parameters to pass to every instance of the compiler.","required":false}},"outputs":{"sarif":{"description":"The path to the SARIF file that is generated containing all the results."}},"runs":{"using":"node12","main":"dist/index.js"},"default_branch":"main","path":null},"repo_metadata":{"id":43050115,"uuid":"381778336","full_name":"microsoft/msvc-code-analysis-action","owner":"microsoft","description":"Microsoft Visual C++ Code Analysis GitHub Action","archived":false,"fork":false,"pushed_at":"2023-07-19T04:53:23.000Z","size":396,"stargazers_count":45,"open_issues_count":15,"forks_count":14,"subscribers_count":6,"default_branch":"main","last_synced_at":"2025-10-10T00:13:05.232Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/microsoft.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":"SUPPORT.md","governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2021-06-30T17:10:47.000Z","updated_at":"2025-10-07T09:07:03.000Z","dependencies_parsed_at":"2024-09-26T20:13:32.705Z","dependency_job_id":"b71df7a9-e342-4a3b-b347-91a1a94ad972","html_url":"https://github.com/microsoft/msvc-code-analysis-action","commit_stats":{"total_commits":13,"total_committers":5,"mean_commits":2.6,"dds":0.3076923076923077,"last_synced_commit":"96315324a485db21449515180214ecb78c16a1c5"},"previous_names":[],"tags_count":3,"template":false,"template_full_name":null,"purl":"pkg:github/microsoft/msvc-code-analysis-action","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/microsoft","download_url":"https://codeload.github.com/microsoft/msvc-code-analysis-action/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/sbom","scorecard":{"id":643412,"data":{"date":"2025-08-11","repo":{"name":"github.com/microsoft/msvc-code-analysis-action","commit":"96315324a485db21449515180214ecb78c16a1c5"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4,"checks":[{"name":"Code-Review","score":2,"reason":"Found 3/12 approved changesets -- score normalized to 2","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: SECURITY.md:1","Info: Found linked content: SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: SECURITY.md:1","Info: Found text in security policy: SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/run-tests.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/run-tests.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/microsoft/msvc-code-analysis-action/run-tests.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/run-tests.yml:27: update your workflow using https://app.stepsecurity.io/secureworkflow/microsoft/msvc-code-analysis-action/run-tests.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/run-tests.yml:61: update your workflow using https://app.stepsecurity.io/secureworkflow/microsoft/msvc-code-analysis-action/run-tests.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/run-tests.yml:84: update your workflow using https://app.stepsecurity.io/secureworkflow/microsoft/msvc-code-analysis-action/run-tests.yml/main?enable=pin","Info:   0 out of   4 GitHub-owned GitHubAction dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: MIT License: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":6,"reason":"branch protection is not maximal on development and all release branches","details":["Info: 'allow deletion' disabled on branch 'main'","Info: 'force pushes' disabled on branch 'main'","Warn: 'branch protection settings apply to administrators' is disabled on branch 'main'","Warn: 'stale review dismissal' is disabled on branch 'main'","Warn: required approving review count is 1 on branch 'main'","Warn: codeowners review is required - but no codeowners file found in repo","Info: 'last push approval' is required to merge on branch 'main'","Warn: no status checks found to merge onto branch 'main'","Info: PRs are required in order to make changes on branch 'main'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 12 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Vulnerabilities","score":1,"reason":"9 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GHSA-v6h2-p8h4-qcjw","Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg","Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275","Warn: Project is vulnerable to: GHSA-4q6p-r6v2-jvc5","Warn: Project is vulnerable to: GHSA-mwcw-c2x4-8c55","Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw","Warn: Project is vulnerable to: GHSA-76p7-773f-r4q5","Warn: Project is vulnerable to: GHSA-52f5-9888-hmc6","Warn: Project is vulnerable to: GHSA-j8xg-fqg3-53r7"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-21T11:25:28.786Z","repository_id":43050115,"created_at":"2025-08-21T11:25:28.786Z","updated_at":"2025-08-21T11:25:28.786Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279002374,"owners_count":26083356,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-09T02:00:07.460Z","response_time":59,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"},"owner_record":{"login":"microsoft","name":"Microsoft","uuid":"6154722","kind":"organization","description":"Open source projects and samples from Microsoft","email":"opensource@microsoft.com","website":"https://opensource.microsoft.com","location":"Redmond, WA","twitter":"OpenAtMicrosoft","company":null,"icon_url":"https://avatars.githubusercontent.com/u/6154722?v=4","repositories_count":7413,"last_synced_at":"2025-10-10T00:07:37.919Z","metadata":{"has_sponsors_listing":false},"html_url":"https://github.com/microsoft","funding_links":[],"total_stars":3539276,"followers":104311,"following":0,"created_at":"2022-11-02T16:20:12.368Z","updated_at":"2025-10-10T00:07:37.919Z","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/microsoft","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/microsoft/repositories"},"tags":[{"name":"v0.1.1","sha":"24c285ab36952c9e9182f4b78dfafbac38a7e5ee","kind":"commit","published_at":"2022-08-19T21:43:29.000Z","download_url":"https://codeload.github.com/microsoft/msvc-code-analysis-action/tar.gz/v0.1.1","html_url":"https://github.com/microsoft/msvc-code-analysis-action/releases/tag/v0.1.1","dependencies_parsed_at":"2023-05-30T23:42:20.005Z","dependency_job_id":null,"purl":"pkg:github/microsoft/msvc-code-analysis-action@v0.1.1","tag_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/tags/v0.1.1","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/tags/v0.1.1/manifests"},{"name":"v0.1.0","sha":"47ecec99bf7ce0399ed85cbb5012b6f24eab5959","kind":"commit","published_at":"2021-10-29T17:52:33.000Z","download_url":"https://codeload.github.com/microsoft/msvc-code-analysis-action/tar.gz/v0.1.0","html_url":"https://github.com/microsoft/msvc-code-analysis-action/releases/tag/v0.1.0","dependencies_parsed_at":"2023-05-30T23:42:20.577Z","dependency_job_id":null,"purl":"pkg:github/microsoft/msvc-code-analysis-action@v0.1.0","tag_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/tags/v0.1.0","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/tags/v0.1.0/manifests"},{"name":"v0.0.1","sha":"502db28262ba134c9a621d5a509b9f7e696c99b6","kind":"commit","published_at":"2021-10-08T21:57:23.000Z","download_url":"https://codeload.github.com/microsoft/msvc-code-analysis-action/tar.gz/v0.0.1","html_url":"https://github.com/microsoft/msvc-code-analysis-action/releases/tag/v0.0.1","dependencies_parsed_at":"2023-05-30T23:42:21.325Z","dependency_job_id":null,"purl":"pkg:github/microsoft/msvc-code-analysis-action@v0.0.1","tag_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/tags/v0.0.1","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/tags/v0.0.1/manifests"}]},"repo_metadata_updated_at":"2025-10-11T15:10:53.434Z","dependent_packages_count":0,"downloads":null,"downloads_period":null,"dependent_repos_count":228,"rankings":{"downloads":null,"dependent_repos_count":2.848993820313738,"dependent_packages_count":0.0,"stargazers_count":5.7581999683093015,"forks_count":3.859927111392806,"docker_downloads_count":4.85184598320393,"average":3.463793376643955},"purl":"pkg:githubactions/microsoft/msvc-code-analysis-action","advisories":[],"docker_usage_url":"https://docker.ecosyste.ms/usage/actions/microsoft/msvc-code-analysis-action","docker_dependents_count":1,"docker_downloads_count":5,"usage_url":"https://repos.ecosyste.ms/usage/actions/microsoft/msvc-code-analysis-action","dependent_repositories_url":"https://repos.ecosyste.ms/api/v1/usage/actions/microsoft/msvc-code-analysis-action/dependencies","status":null,"funding_links":[],"critical":null,"issue_metadata":{"last_synced_at":"2025-09-01T01:00:41.411Z","issues_count":21,"pull_requests_count":24,"avg_time_to_close_issue":5027814.4,"avg_time_to_close_pull_request":10334339.388888888,"issues_closed_count":10,"pull_requests_closed_count":18,"pull_request_authors_count":7,"issue_authors_count":13,"avg_comments_per_issue":1.5238095238095237,"avg_comments_per_pull_request":0.6666666666666666,"merged_pull_requests_count":13,"bot_issues_count":0,"bot_pull_requests_count":6,"past_year_issues_count":1,"past_year_pull_requests_count":0,"past_year_avg_time_to_close_issue":null,"past_year_avg_time_to_close_pull_request":null,"past_year_issues_closed_count":0,"past_year_pull_requests_closed_count":0,"past_year_pull_request_authors_count":0,"past_year_issue_authors_count":1,"past_year_avg_comments_per_issue":1.0,"past_year_avg_comments_per_pull_request":null,"past_year_bot_issues_count":0,"past_year_bot_pull_requests_count":0,"past_year_merged_pull_requests_count":0,"issues_url":"https://issues.ecosyste.ms/api/v1/hosts/GitHub/repositories/microsoft%2Fmsvc-code-analysis-action/issues","maintainers":[{"login":"d-winsor","count":10,"url":"https://issues.ecosyste.ms/api/v1/hosts/GitHub/authors/d-winsor"},{"login":"walbourn","count":2,"url":"https://issues.ecosyste.ms/api/v1/hosts/GitHub/authors/walbourn"},{"login":"Rastaban","count":1,"url":"https://issues.ecosyste.ms/api/v1/hosts/GitHub/authors/Rastaban"},{"login":"snnn","count":1,"url":"https://issues.ecosyste.ms/api/v1/hosts/GitHub/authors/snnn"}],"active_maintainers":[{"login":"walbourn","count":1,"url":"https://issues.ecosyste.ms/api/v1/hosts/GitHub/authors/walbourn"}]},"versions_url":"https://packages.ecosyste.ms/api/v1/registries/github%20actions/packages/microsoft%2Fmsvc-code-analysis-action/versions","version_numbers_url":"https://packages.ecosyste.ms/api/v1/registries/github%20actions/packages/microsoft%2Fmsvc-code-analysis-action/version_numbers","dependent_packages_url":"https://packages.ecosyste.ms/api/v1/registries/github%20actions/packages/microsoft%2Fmsvc-code-analysis-action/dependent_packages","related_packages_url":"https://packages.ecosyste.ms/api/v1/registries/github%20actions/packages/microsoft%2Fmsvc-code-analysis-action/related_packages","codemeta_url":"https://packages.ecosyste.ms/api/v1/registries/github%20actions/packages/microsoft%2Fmsvc-code-analysis-action/codemeta","maintainers":[]}