Skip to content

Conversation

@elangosenthilnathan
Copy link
Owner

Qwiet LogoQwiet Logo

This pull request enables build rules. You can read more about build rules here. The build rules are controlled by the shiftleft.yml file in the repository.

Visit app.shiftleft.io to see the security findings for this repository.

We've done a few things on your behalf

  • Forked this demo application
  • Generated a unique secret SHIFTLEFT_ACCESS_TOKEN to allow GitHub Actions in this repository to communicate with the Qwiet (Shiftleft) API
  • Committed a GitHub Action that will invoke Qwiet preZero's Static Application Security Testing (SAST) on all future pull requests on this repository
  • Created this pull request that demonstrates build rules. It also adds a status check that displays the result of the GitHub Action

Questions? Comments? Want to learn more? Get in touch with us or check out our documentation.

@github-actions
Copy link

github-actions bot commented Mar 27, 2025

Qwiet LogoQwiet Logo

Checking analysis of application elangosenthilnathan-shiftleft-java-demo.

Using sl version 0.9.3356 (169fef89451c4c02b1103a1d0d8aab4225c6ca57).

Checking findings on scan 5.

Results per rule:

  • report: FAIL
    (234 matched vulnerabilities; configured threshold is 0).

    First 5 findings:

        ID   CVSS    Rating    CVE              Title                                                                                                                                                     
     127   10.0   critical   CVE-2018-14721   FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to b…
     300   10.0   critical   GMS-2022-559     Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in org.springframework:spring-core.                            
     317   10.0   critical   GMS-2022-558     Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in org.springframework:spring-beans.                           
     336   10.0   critical   GMS-2022-560     Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in org.springframework.boot:spring-boot-starter-web.           
      90    9.8   critical   CVE-2017-5929    QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderCli…
     Severity rating   Count 
     Critical             45 
     High                 97 
     Medium               84 
     Low                   8 
     Finding Type   Count 
     Oss_vuln         201 
     Vuln              33 
     Category                           Count 
     Cross-Site Scripting                  15 
     Insecure Direct Object Reference       5 
     Header Injection                       3 
     Security Best Practices                2 
     Open Redirect                          2 
     Weak Hash                              1 
     Timing Attack                          1 
     Remote Code Execution                  1 
     Log Forging                            1 
     Directory Traversal                    1 
     Deserialization                        1 
     OWASP 2021 Category                              Count 
     A03-Injection                                       24 
     A01-Broken-Access-Control                            3 
     A05-Security-Misconfiguration                        2 
     A09-Security-Logging-And-Monitoring-Failures         1 
     A08-Software-And-Data-Integrity-Failures             1 
     A07-Identification-And-Authentication-Failures       1 
     A02-Cryptographic-Failures                           1 

1 rule failed.

@github-actions
Copy link

Qwiet LogoQwiet Logo

Checking analysis of application shiftleft-java-demo against 3 build rules.

Using sl version 0.9.3140 (a67f6e278ee40075edf5274a3582016a32f70bc2).

querying scans/check: API returned status 403, with code: 'USER_TOKEN_REQUIRED' message: 'The authentication token for the request must belong to a user'.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants