Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability Management #1706

Closed
wants to merge 174 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
174 commits
Select commit Hold shift + click to select a range
713e090
Create SECURITY.md
4k4xs4pH1r3 Dec 13, 2020
4fbd7d9
Create codeql-analysis.yml
4k4xs4pH1r3 Dec 13, 2020
76768c4
Create ossar-analysis.yml
4k4xs4pH1r3 Dec 13, 2020
c3773cf
Create veracode-analysis.yml
4k4xs4pH1r3 Dec 13, 2020
618e027
Add .whitesource configuration file
mend-bolt-for-github[bot] Dec 30, 2021
a33455c
Merge branch 'mandiant:master' into master
4k4xs4pH1r3 Aug 11, 2023
313f595
Merge pull request #9 from 4k4xs4pH1r3/whitesource/configure
4k4xs4pH1r3 Aug 11, 2023
4b67c19
Merge branch 'master' into master
4k4xs4pH1r3 Aug 11, 2023
4fe6746
build(deps-dev): bump types-pyyaml from 6.0.8 to 6.0.12.11
dependabot[bot] Aug 14, 2023
6cdc242
build(deps-dev): bump types-protobuf from 4.23.0.3 to 4.24.0.1
dependabot[bot] Aug 14, 2023
f76e9d5
Merge branch 'master' into master
4k4xs4pH1r3 Aug 15, 2023
87abf14
Merge branch 'master' into master
4k4xs4pH1r3 Aug 22, 2023
b1111bf
Merge branch 'master' into master
4k4xs4pH1r3 Aug 29, 2023
1931b98
build(deps-dev): bump isort from 5.11.4 to 5.12.0
dependabot[bot] Aug 29, 2023
ead98af
Merge pull request #26 from 4k4xs4pH1r3/dependabot/pip/isort-5.12.0
4k4xs4pH1r3 Aug 29, 2023
777b201
Merge pull request #29 from 4k4xs4pH1r3/dependabot/pip/types-pyyaml-6…
4k4xs4pH1r3 Aug 29, 2023
0b15177
Merge pull request #30 from 4k4xs4pH1r3/dependabot/pip/types-protobuf…
4k4xs4pH1r3 Aug 29, 2023
32645b0
build(deps-dev): bump types-colorama from 0.4.15.11 to 0.4.15.12
dependabot[bot] Aug 29, 2023
4f12b9e
build(deps-dev): bump pyinstaller from 5.10.1 to 5.13.1
dependabot[bot] Aug 29, 2023
a7dfd46
Merge pull request #31 from 4k4xs4pH1r3/dependabot/pip/types-colorama…
4k4xs4pH1r3 Aug 29, 2023
3099023
Merge pull request #32 from 4k4xs4pH1r3/dependabot/pip/pyinstaller-5.…
4k4xs4pH1r3 Aug 29, 2023
585f17c
.
4k4xs4pH1r3 Aug 29, 2023
a139a65
Add .whitesource configuration file
mend-bolt-for-github[bot] Aug 29, 2023
bb29217
Merge pull request #33 from 4k4xs4pH1r3/whitesource/configure
4k4xs4pH1r3 Aug 29, 2023
f6deca6
.
4k4xs4pH1r3 Aug 29, 2023
4f49597
Add .whitesource configuration file
mend-bolt-for-github[bot] Aug 29, 2023
763c7f1
papeloto replaced by vimtor
4k4xs4pH1r3 Aug 29, 2023
dfbe7e7
.
4k4xs4pH1r3 Aug 29, 2023
71c578e
Merge pull request #34 from 4k4xs4pH1r3/whitesource/configure
4k4xs4pH1r3 Aug 29, 2023
d0d42fd
upgrade .github/workflows/veracode-analysis.yml.
4k4xs4pH1r3 Aug 29, 2023
c28b05c
upgrade .github/workflows/veracode-analysis.yml
4k4xs4pH1r3 Aug 29, 2023
29b44a7
Merge branch 'master' into master
4k4xs4pH1r3 Aug 31, 2023
0ebc019
Merge branch 'master' into master
4k4xs4pH1r3 Sep 13, 2023
91c0425
Merge branch 'master' into master
4k4xs4pH1r3 Sep 25, 2023
3e9aa87
codeql-analysis: restrict to python only
williballenthin Sep 27, 2023
f1858ba
Merge branch 'master' into master
williballenthin Sep 27, 2023
f26758c
Merge branch 'master' into master
4k4xs4pH1r3 Sep 30, 2023
c72070c
build(deps-dev): bump types-psutil from 5.8.23 to 5.9.5.17
dependabot[bot] Oct 16, 2023
3cd0de1
Merge branch 'master' into master
4k4xs4pH1r3 Oct 16, 2023
6c1fb3b
Merge branch 'master' into master
4k4xs4pH1r3 Oct 18, 2023
d2d9417
build(deps-dev): bump types-termcolor from 1.1.4 to 1.1.6.2
dependabot[bot] Oct 23, 2023
02aa32a
Merge branch 'master' into master
4k4xs4pH1r3 Nov 30, 2023
a4e99ac
build(deps-dev): bump pydantic from 2.1.1 to 2.5.2
dependabot[bot] Nov 30, 2023
0a51d6d
build(deps-dev): bump protobuf from 4.23.4 to 4.25.1
dependabot[bot] Nov 30, 2023
20f9992
Merge branch 'master' into master
4k4xs4pH1r3 Jan 26, 2024
06230f4
Merge branch 'master' into master
4k4xs4pH1r3 Jan 31, 2024
6a30a0e
Merge branch 'master' into dependabot/pip/types-psutil-5.9.5.17
4k4xs4pH1r3 Jan 31, 2024
5c76bd2
Merge pull request #50 from 4k4xs4pH1r3/dependabot/pip/types-psutil-5…
4k4xs4pH1r3 Jan 31, 2024
f10b31e
Merge branch 'master' into dependabot/pip/types-termcolor-1.1.6.2
4k4xs4pH1r3 Jan 31, 2024
da27622
Merge pull request #51 from 4k4xs4pH1r3/dependabot/pip/types-termcolo…
4k4xs4pH1r3 Jan 31, 2024
14ae0de
Merge pull request #53 from 4k4xs4pH1r3/dependabot/pip/protobuf-4.25.1
4k4xs4pH1r3 Jan 31, 2024
04f5de8
Merge branch 'master' into dependabot/pip/pydantic-2.5.2
4k4xs4pH1r3 Jan 31, 2024
eebcced
Merge pull request #55 from 4k4xs4pH1r3/dependabot/pip/pydantic-2.5.2
4k4xs4pH1r3 Jan 31, 2024
34a0eab
Create codeql.yml
4k4xs4pH1r3 Jan 31, 2024
f1a7860
build(deps-dev): bump pre-commit from 3.5.0 to 3.6.0
dependabot[bot] Jan 31, 2024
b3e1624
build(deps-dev): bump isort from 5.12.0 to 5.13.2
dependabot[bot] Jan 31, 2024
72adb34
build(deps-dev): bump types-colorama from 0.4.15.12 to 0.4.15.20240106
dependabot[bot] Jan 31, 2024
b99038e
build(deps-dev): bump psutil from 5.9.2 to 5.9.8
dependabot[bot] Jan 31, 2024
46f649a
Merge pull request #57 from 4k4xs4pH1r3/dependabot/pip/pre-commit-3.6.0
4k4xs4pH1r3 Jan 31, 2024
b567127
Merge branch 'master' into dependabot/pip/isort-5.13.2
4k4xs4pH1r3 Jan 31, 2024
45b0e4a
Merge pull request #58 from 4k4xs4pH1r3/dependabot/pip/isort-5.13.2
4k4xs4pH1r3 Jan 31, 2024
90acb34
Merge branch 'master' into dependabot/pip/types-colorama-0.4.15.20240106
4k4xs4pH1r3 Jan 31, 2024
42ff23c
Merge pull request #59 from 4k4xs4pH1r3/dependabot/pip/types-colorama…
4k4xs4pH1r3 Jan 31, 2024
791b0df
Merge branch 'master' into dependabot/pip/psutil-5.9.8
4k4xs4pH1r3 Jan 31, 2024
c8f4623
Merge pull request #60 from 4k4xs4pH1r3/dependabot/pip/psutil-5.9.8
4k4xs4pH1r3 Jan 31, 2024
db022be
build(deps-dev): bump types-pyyaml from 6.0.12.11 to 6.0.12.12
dependabot[bot] Jan 31, 2024
d832678
Merge pull request #61 from 4k4xs4pH1r3/dependabot/pip/types-pyyaml-6…
4k4xs4pH1r3 Jan 31, 2024
bd03e20
build(deps-dev): bump types-psutil from 5.9.5.17 to 5.9.5.20240106
dependabot[bot] Jan 31, 2024
8ee1715
build(deps-dev): bump ruff from 0.1.14 to 0.1.15
dependabot[bot] Jan 31, 2024
e981a51
build(deps-dev): bump protobuf from 4.25.1 to 4.25.2
dependabot[bot] Jan 31, 2024
bda04f2
build(deps-dev): bump networkx from 3.1 to 3.2.1
dependabot[bot] Jan 31, 2024
bdac516
build(deps-dev): bump pydantic from 2.5.2 to 2.6.0
dependabot[bot] Jan 31, 2024
59e22da
Merge pull request #62 from 4k4xs4pH1r3/dependabot/pip/types-psutil-5…
4k4xs4pH1r3 Jan 31, 2024
ef0b327
Merge branch 'master' into dependabot/pip/ruff-0.1.15
4k4xs4pH1r3 Jan 31, 2024
a51c1e9
Merge pull request #63 from 4k4xs4pH1r3/dependabot/pip/ruff-0.1.15
4k4xs4pH1r3 Jan 31, 2024
b7e50a5
Merge branch 'master' into dependabot/pip/protobuf-4.25.2
4k4xs4pH1r3 Jan 31, 2024
76ce0ab
Merge pull request #64 from 4k4xs4pH1r3/dependabot/pip/protobuf-4.25.2
4k4xs4pH1r3 Jan 31, 2024
1bda85e
Merge branch 'master' into dependabot/pip/networkx-3.2.1
4k4xs4pH1r3 Jan 31, 2024
c8b64fd
Merge pull request #65 from 4k4xs4pH1r3/dependabot/pip/networkx-3.2.1
4k4xs4pH1r3 Jan 31, 2024
31b28c1
Merge branch 'master' into dependabot/pip/pydantic-2.6.0
4k4xs4pH1r3 Jan 31, 2024
5aa200d
Merge pull request #66 from 4k4xs4pH1r3/dependabot/pip/pydantic-2.6.0
4k4xs4pH1r3 Jan 31, 2024
8527581
Update README.md
4k4xs4pH1r3 Jan 31, 2024
487bea3
[StepSecurity] Apply security best practices
step-security-bot Jan 31, 2024
4489b6e
Merge pull request #68 from step-security-bot/stepsecurity_remediatio…
4k4xs4pH1r3 Jan 31, 2024
7f85805
build(deps): bump actions/checkout from 2.7.0 to 4.1.1
dependabot[bot] Jan 31, 2024
f66180d
build(deps): bump svenstaro/upload-release-action from 2.4.0 to 2.7.0
dependabot[bot] Jan 31, 2024
32348a0
build(deps): bump ad-m/github-push-action
dependabot[bot] Jan 31, 2024
9937bd0
build(deps): bump actions/dependency-review-action from 2.5.1 to 4.0.0
dependabot[bot] Jan 31, 2024
df2b134
build(deps): bump actions/setup-java from 3.11.0 to 4.0.0
dependabot[bot] Jan 31, 2024
8f1f0db
build(deps-dev): bump types-tabulate from 0.9.0.3 to 0.9.0.20240106
dependabot[bot] Jan 31, 2024
8a5847e
build(deps-dev): bump types-protobuf from 4.24.0.1 to 4.24.0.20240129
dependabot[bot] Jan 31, 2024
701dd3c
Merge pull request #69 from 4k4xs4pH1r3/dependabot/github_actions/act…
4k4xs4pH1r3 Jan 31, 2024
08b52b1
Merge branch 'master' into dependabot/github_actions/svenstaro/upload…
4k4xs4pH1r3 Jan 31, 2024
425cfe2
Merge pull request #70 from 4k4xs4pH1r3/dependabot/github_actions/sve…
4k4xs4pH1r3 Jan 31, 2024
4bc8bc9
Merge branch 'master' into dependabot/github_actions/ad-m/github-push…
4k4xs4pH1r3 Jan 31, 2024
0179c5f
Merge pull request #71 from 4k4xs4pH1r3/dependabot/github_actions/ad-…
4k4xs4pH1r3 Jan 31, 2024
6f0ac68
Merge branch 'master' into dependabot/github_actions/actions/dependen…
4k4xs4pH1r3 Jan 31, 2024
7ca05f7
Merge pull request #72 from 4k4xs4pH1r3/dependabot/github_actions/act…
4k4xs4pH1r3 Jan 31, 2024
5a4bc21
Merge branch 'master' into dependabot/github_actions/actions/setup-ja…
4k4xs4pH1r3 Jan 31, 2024
f7ff5ae
Merge pull request #73 from 4k4xs4pH1r3/dependabot/github_actions/act…
4k4xs4pH1r3 Jan 31, 2024
ac976e6
Merge branch 'master' into dependabot/pip/types-tabulate-0.9.0.20240106
4k4xs4pH1r3 Jan 31, 2024
94568fe
Merge pull request #74 from 4k4xs4pH1r3/dependabot/pip/types-tabulate…
4k4xs4pH1r3 Jan 31, 2024
02ef7ad
Merge branch 'master' into dependabot/pip/types-protobuf-4.24.0.20240129
4k4xs4pH1r3 Jan 31, 2024
515db1b
Merge pull request #75 from 4k4xs4pH1r3/dependabot/pip/types-protobuf…
4k4xs4pH1r3 Jan 31, 2024
63382c2
Create codacy.yml
4k4xs4pH1r3 Jan 31, 2024
8a6cc62
Create snyk-security.yml
4k4xs4pH1r3 Jan 31, 2024
144afbf
Create sysdig-scan.yml
4k4xs4pH1r3 Jan 31, 2024
bf657f9
Create apisec-scan.yml
4k4xs4pH1r3 Jan 31, 2024
f33f896
Create bandit.yml
4k4xs4pH1r3 Jan 31, 2024
825f0c3
Create checkmarx-one.yml
4k4xs4pH1r3 Jan 31, 2024
a566612
Create checkmarx.yml
4k4xs4pH1r3 Jan 31, 2024
6c5ae71
Create crda.yml
4k4xs4pH1r3 Jan 31, 2024
fcc7a7c
Create devskim.yml
4k4xs4pH1r3 Jan 31, 2024
9302121
Create defender-for-devops.yml
4k4xs4pH1r3 Jan 31, 2024
44e2b3b
Create endorlabs.yml
4k4xs4pH1r3 Jan 31, 2024
7724cb6
Create ethicalcheck.yml
4k4xs4pH1r3 Jan 31, 2024
b49cf28
Create frogbot-scan-and-fix.yml
4k4xs4pH1r3 Jan 31, 2024
0cd0dd1
Create frogbot-scan-pr.yml
4k4xs4pH1r3 Jan 31, 2024
559e6a1
Create mayhem-for-api.yml
4k4xs4pH1r3 Jan 31, 2024
eca8150
Create fortify.yml
4k4xs4pH1r3 Jan 31, 2024
0e1b76c
Create ossar.yml
4k4xs4pH1r3 Jan 31, 2024
6cdf4e8
Create pyre.yml
4k4xs4pH1r3 Jan 31, 2024
61134c2
Create pysa.yml
4k4xs4pH1r3 Jan 31, 2024
c78b54a
Create semgrep.yml
4k4xs4pH1r3 Jan 31, 2024
2ce5c1d
Create stackhawk.yml
4k4xs4pH1r3 Jan 31, 2024
cc7c2e9
Create synopsys-action.yml
4k4xs4pH1r3 Jan 31, 2024
2eea8d6
Create synopsys-io.yml
4k4xs4pH1r3 Jan 31, 2024
5982a2b
Create veracode.yml
4k4xs4pH1r3 Jan 31, 2024
b55f014
Create anchore-syft.yml
4k4xs4pH1r3 Jan 31, 2024
0f650a7
Create anchore.yml
4k4xs4pH1r3 Jan 31, 2024
2a0a5be
Create hadolint.yml
4k4xs4pH1r3 Jan 31, 2024
573537e
Create snyk-container.yml
4k4xs4pH1r3 Jan 31, 2024
830a89a
Create trivy.yml
4k4xs4pH1r3 Jan 31, 2024
c81c2db
Create bearer.yml
4k4xs4pH1r3 Jan 31, 2024
6e46160
Create brakeman.yml
4k4xs4pH1r3 Jan 31, 2024
0f4ff31
Create clj-holmes.yml
4k4xs4pH1r3 Jan 31, 2024
44e9b11
Create codescan.yml
4k4xs4pH1r3 Jan 31, 2024
e6d61ec
Create clj-watson.yml
4k4xs4pH1r3 Jan 31, 2024
af30ea8
Create cloudrail.yml
4k4xs4pH1r3 Jan 31, 2024
98d123d
Create contrast-scan.yml
4k4xs4pH1r3 Jan 31, 2024
993df1d
Create credo.yml
4k4xs4pH1r3 Jan 31, 2024
f7fd3a0
Create crunch42.yml
4k4xs4pH1r3 Jan 31, 2024
b4560b2
Create datree.yml
4k4xs4pH1r3 Jan 31, 2024
1530500
Create detekt.yml
4k4xs4pH1r3 Jan 31, 2024
d1bc393
Create eslint.yml
4k4xs4pH1r3 Jan 31, 2024
ee7c411
Create flawfinder.yml
4k4xs4pH1r3 Jan 31, 2024
97ab8dd
Create jscrambler-code-integrity.yml
4k4xs4pH1r3 Jan 31, 2024
c92e9a6
Create kubesec.yml
4k4xs4pH1r3 Jan 31, 2024
34b1efd
Create lintr.yml
4k4xs4pH1r3 Jan 31, 2024
c750914
Create mobsf.yml
4k4xs4pH1r3 Jan 31, 2024
4a0f245
Create msvc.yml
4k4xs4pH1r3 Jan 31, 2024
fdee965
Create njsscan.yml
4k4xs4pH1r3 Jan 31, 2024
901bc45
Create nowsecure-mobile-sbom.yml
4k4xs4pH1r3 Jan 31, 2024
b483a8c
Create nowsecure.yml
4k4xs4pH1r3 Jan 31, 2024
7907f8f
Create phpmd.yml
4k4xs4pH1r3 Jan 31, 2024
3755803
Create pmd.yml
4k4xs4pH1r3 Jan 31, 2024
151e96b
Create powershell.yml
4k4xs4pH1r3 Jan 31, 2024
8648a3f
Create prisma.yml
4k4xs4pH1r3 Jan 31, 2024
715621d
Create psalm.yml
4k4xs4pH1r3 Jan 31, 2024
2d141f0
Create puppet-lint.yml
4k4xs4pH1r3 Jan 31, 2024
5eac9ca
Create rubocop.yml
4k4xs4pH1r3 Jan 31, 2024
9aab629
Create rust-clippy.yml
4k4xs4pH1r3 Jan 31, 2024
25bcaa3
Create securitycodescan.yml
4k4xs4pH1r3 Jan 31, 2024
a372e47
Create snyk-infrastructure.yml
4k4xs4pH1r3 Jan 31, 2024
35ed57d
Create sobelow.yml
4k4xs4pH1r3 Jan 31, 2024
1786b69
Create sonarcloud.yml
4k4xs4pH1r3 Jan 31, 2024
0c1bd00
Create sonarqube.yml
4k4xs4pH1r3 Jan 31, 2024
b778df0
Create soos-dast-scan.yml
4k4xs4pH1r3 Jan 31, 2024
36fa405
Create tfsec.yml
4k4xs4pH1r3 Jan 31, 2024
9e37fe8
Create xanitizer.yml
4k4xs4pH1r3 Jan 31, 2024
9b15eff
Create zscaler-iac-scan.yml
4k4xs4pH1r3 Jan 31, 2024
135b3d0
Create zscan.yml
4k4xs4pH1r3 Jan 31, 2024
10a97e4
Create cleanthat.yaml
4k4xs4pH1r3 Jan 31, 2024
edd55da
Update dependabot.yml
4k4xs4pH1r3 Jan 31, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions .github/.whitesource
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
{
"scanSettings": {
"baseBranches": []
},
"checkRunSettings": {
"vulnerableCheckRunConclusionLevel": "failure",
"displayMode": "diff"
},
"issueSettings": {
"minSeverityLevel": "LOW"
}
}
42 changes: 40 additions & 2 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,44 @@
# To get started with Dependabot version updates, you'll need to specify which
# package ecosystems to update and where the package manifests are located.
# Please see the documentation for all configuration options:
# https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates

version: 2
enable-beta-ecosystems: true
updates:
- package-ecosystem: "pip"
- package-ecosystem: "pub" # See documentation for possible values.
directory: "" # Location of package manifests
schedule:
interval: "daily"

updates:
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "weekly"
# Check for updates to GitHub Actions every weekday
interval: "daily"

updates:
- package-ecosystem: "npm"
directory: ""
schedule:
interval: "daily"
# Update the npm manifest file to relax
# the version requirements
versioning-strategy: widen

- package-ecosystem: "composer"
directory: ""
schedule:
interval: "daily"
# Increase the version requirements for Composer
# only when required
versioning-strategy: increase-if-necessary

- package-ecosystem: "pip"
directory: ""
schedule:
interval: "daily"
# Only allow updates to the lockfile for pip and
# ignore any version updates that affect the manifest
versioning-strategy: lockfile-only
38 changes: 38 additions & 0 deletions .github/workflows/anchore-syft.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# This workflow checks out code, builds an image, performs a container image
# scan with Anchore's Syft tool, and uploads the results to the GitHub Dependency
# submission API.

# For more information on the Anchore sbom-action usage
# and parameters, see https://github.com/anchore/sbom-action. For more
# information about the Anchore SBOM tool, Syft, see
# https://github.com/anchore/syft
name: Anchore Syft SBOM scan

on:
push:
branches: [ "master" ]

permissions:
contents: write

jobs:
Anchore-Build-Scan:
permissions:
contents: write # required to upload to the Dependency submission API
runs-on: ubuntu-latest
steps:
- name: Checkout the code
uses: actions/checkout@v3
- name: Build the Docker image
run: docker build . --file Dockerfile --tag localbuild/testimage:latest
- name: Scan the image and upload dependency results
uses: anchore/sbom-action@bb716408e75840bbb01e839347cd213767269d4a
with:
image: "localbuild/testimage:latest"
artifact-name: image.spdx.json
dependency-snapshot: true
48 changes: 48 additions & 0 deletions .github/workflows/anchore.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# This workflow checks out code, builds an image, performs a container image
# vulnerability scan with Anchore's Grype tool, and integrates the results with GitHub Advanced Security
# code scanning feature. For more information on the Anchore scan action usage
# and parameters, see https://github.com/anchore/scan-action. For more
# information on Anchore's container image scanning tool Grype, see
# https://github.com/anchore/grype
name: Anchore Grype vulnerability scan

on:
push:
branches: [ "master" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "master" ]
schedule:
- cron: '39 2 * * 4'

permissions:
contents: read

jobs:
Anchore-Build-Scan:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
runs-on: ubuntu-latest
steps:
- name: Check out the code
uses: actions/checkout@v3
- name: Build the Docker image
run: docker build . --file Dockerfile --tag localbuild/testimage:latest
- name: Run the Anchore Grype scan action
uses: anchore/scan-action@d5aa5b6cb9414b0c7771438046ff5bcfa2854ed7
id: scan
with:
image: "localbuild/testimage:latest"
fail-build: true
severity-cutoff: critical
- name: Upload vulnerability report
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: ${{ steps.scan.outputs.sarif }}
71 changes: 71 additions & 0 deletions .github/workflows/apisec-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# APIsec addresses the critical need to secure APIs before they reach production.
# APIsec provides the industry’s only automated and continuous API testing platform that uncovers security vulnerabilities and logic flaws in APIs.
# Clients rely on APIsec to evaluate every update and release, ensuring that no APIs go to production with vulnerabilities.

# How to Get Started with APIsec.ai
# 1. Schedule a demo at https://www.apisec.ai/request-a-demo .
#
# 2. Register your account at https://cloud.apisec.ai/#/signup .
#
# 3. Register your API . See the video (https://www.youtube.com/watch?v=MK3Xo9Dbvac) to get up and running with APIsec quickly.
#
# 4. Get GitHub Actions scan attributes from APIsec Project -> Configurations -> Integrations -> CI-CD -> GitHub Actions
#
# apisec-run-scan
#
# This action triggers the on-demand scans for projects registered in APIsec.
# If your GitHub account allows code scanning alerts, you can then upload the sarif file generated by this action to show the scan findings.
# Else you can view the scan results from the project home page in APIsec Platform.
# The link to view the scan results is also displayed on the console on successful completion of action.

# This is a starter workflow to help you get started with APIsec-Scan Actions

name: APIsec

# Controls when the workflow will run
on:
# Triggers the workflow on push or pull request events but only for the "master" branch
# Customize trigger events based on your DevSecOps processes.
push:
branches: [ "master" ]
pull_request:
branches: [ "master" ]
schedule:
- cron: '44 3 * * 1'

# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:


permissions:
contents: read

jobs:

Trigger_APIsec_scan:
permissions:
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
runs-on: ubuntu-latest

steps:
- name: APIsec scan
uses: apisec-inc/apisec-run-scan@025432089674a28ba8fb55f8ab06c10215e772ea
with:
# The APIsec username with which the scans will be executed
apisec-username: ${{ secrets.apisec_username }}
# The Password of the APIsec user with which the scans will be executed
apisec-password: ${{ secrets.apisec_password}}
# The name of the project for security scan
apisec-project: "VAmPI"
# The name of the sarif format result file The file is written only if this property is provided.
sarif-result-file: "apisec-results.sarif"
- name: Import results
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: ./apisec-results.sarif
52 changes: 52 additions & 0 deletions .github/workflows/bandit.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# Bandit is a security linter designed to find common security issues in Python code.
# This action will run Bandit on your codebase.
# The results of the scan will be found under the Security tab of your repository.

# https://github.com/marketplace/actions/bandit-scan is ISC licensed, by abirismyname
# https://pypi.org/project/bandit/ is Apache v2.0 licensed, by PyCQA

name: Bandit
on:
push:
branches: [ "master" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "master" ]
schedule:
- cron: '17 13 * * 4'

jobs:
bandit:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status

runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Bandit Scan
uses: shundor/python-bandit-scan@9cc5aa4a006482b8a7f91134412df6772dbda22c
with: # optional arguments
# exit with 0, even with results found
exit_zero: true # optional, default is DEFAULT
# Github token of the repository (automatically created by Github)
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # Needed to get PR information.
# File or directory to run bandit on
# path: # optional, default is .
# Report only issues of a given severity level or higher. Can be LOW, MEDIUM or HIGH. Default is UNDEFINED (everything)
# level: # optional, default is UNDEFINED
# Report only issues of a given confidence level or higher. Can be LOW, MEDIUM or HIGH. Default is UNDEFINED (everything)
# confidence: # optional, default is UNDEFINED
# comma-separated list of paths (glob patterns supported) to exclude from scan (note that these are in addition to the excluded paths provided in the config file) (default: .svn,CVS,.bzr,.hg,.git,__pycache__,.tox,.eggs,*.egg)
# excluded_paths: # optional, default is DEFAULT
# comma-separated list of test IDs to skip
# skips: # optional, default is DEFAULT
# path to a .bandit file that supplies command line arguments
# ini_path: # optional, default is DEFAULT

43 changes: 43 additions & 0 deletions .github/workflows/bearer.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.
#
# This workflow file requires a free account on Bearer.com to manage findings, notifications and more.
# See https://docs.bearer.com/guides/bearer-cloud/
name: Bearer

on:
push:
branches: ["master" ]
pull_request:
# The branches below must be a subset of the branches above
branches: ["master"]
schedule:
- cron: '30 23 * * 6'

permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status

jobs:
bearer:
runs-on: ubuntu-latest
steps:
# Checkout project source
- uses: actions/checkout@v3
# Scan code using Bearer CLI
- name: Run Report
id: report
uses: bearer/bearer-action@828eeb928ce2f4a7ca5ed57fb8b59508cb8c79bc
with:
api-key: ${{ secrets.BEARER_TOKEN }}
format: sarif
output: results.sarif
exit-code: 0
# Upload SARIF file generated in previous step
- name: Upload SARIF file
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: results.sarif
58 changes: 58 additions & 0 deletions .github/workflows/brakeman.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# This workflow integrates Brakeman with GitHub's Code Scanning feature
# Brakeman is a static analysis security vulnerability scanner for Ruby on Rails applications

name: Brakeman Scan

on:
push:
branches: [ "master" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "master" ]
schedule:
- cron: '25 3 * * 0'

permissions:
contents: read

jobs:
brakeman-scan:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
name: Brakeman Scan
runs-on: ubuntu-latest
steps:
# Checkout the repository to the GitHub Actions runner
- name: Checkout
uses: actions/checkout@v3

# Customize the ruby version depending on your needs
- name: Setup Ruby
uses: ruby/setup-ruby@55283cc23133118229fd3f97f9336ee23a179fcf # v1.146.0
with:
ruby-version: '2.7'

- name: Setup Brakeman
env:
BRAKEMAN_VERSION: '4.10' # SARIF support is provided in Brakeman version 4.10+
run: |
gem install brakeman --version $BRAKEMAN_VERSION

# Execute Brakeman CLI and generate a SARIF output with the security issues identified during the analysis
- name: Scan
continue-on-error: true
run: |
brakeman -f sarif -o output.sarif.json .

# Upload the SARIF file generated in the previous step
- name: Upload SARIF
uses: github/codeql-action/upload-sarif@v2
with:
sarif_file: output.sarif.json
Loading
Loading