Ensuring component security in pipelines
<!--IssueSummary start-->
<details>
<summary>
Everyone can contribute. [Help move this issue forward](https://handbook.gitlab.com/handbook/marketing/developer-relations/contributor-success/community-contributors-workflows/#contributor-links) while earning points, leveling up and collecting rewards.
</summary>
- [Close this issue](https://contributors.gitlab.com/manage-issue?action=close&projectId=278964&issueIid=467927)
</details>
<!--IssueSummary end-->
### Problem
Currently, there is no automated process to ensure pipeline components are free from vulnerabilities before being used in a pipeline. Users are not aware of the underlying dependencies and the risks a component is carrying when including it in their pipeline
This lack of security validation poses a significant risk, as components with undiscovered vulnerabilities can compromise the entire pipeline and the production environment.
### Proposed solution
To address these issues, we need a solution that integrates vulnerability and/or dependency scanning into the component publishing workflow, ensures the immutability of secure versions, and provides continuous security checks and alerts for maintainers and users.
* Provide a report per each component, which include the risk, vulnerabilities, dependencies etc... (Free)
* Ability to block component usage (or publication) that did not pass one of our scans (Paid)
issue