[Security] dependencies should be pinned
Is your feature request related to a problem? Please describe.
To reduce the risk of supply chain attacks, presidio should pin all dependencies strongly.
The following dependencies are not pinned (preferably by hash) .github/workflows/codeql-analysis.yml:43 .github/workflows/codeql-analysis.yml:47 .github/workflows/codeql-analysis.yml:61 .github/workflows/codeql-analysis.yml:74 .github/workflows/stale.yml:15 presidio-analyzer/Dockerfile:1 presidio-anonymizer/Dockerfile:1 presidio-image-redactor/Dockerfile:1 presidio-analyzer/Dockerfile:10-11 presidio-anonymizer/Dockerfile:9-10 presidio-image-redactor/Dockerfile:14-16 docs/samples/deployments/spark/setup/startup.sh:3 docs/samples/deployments/spark/setup/startup.sh:4 docs/samples/deployments/spark/setup/startup.sh:5
Describe the solution you'd like The dependencies listed above are pinned to specific hash.
Additional context part of presidio proposal for ossf best practice badge and improve Scorecard rate for presidio