-
Notifications
You must be signed in to change notification settings - Fork 230
test soos #92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
test soos #92
Conversation
DryRun Security SummaryGitHub Actions workflow implements a multi-layered security scanning pipeline with potential security risks related to secret management, external URL exposure, supply chain vulnerabilities, and credential handling. Expand for full summarySummary: GitHub Actions workflow defines a comprehensive security scanning pipeline with multiple security tools, including static analysis, SCA, DAST, container security, and SAST scans. Security Findings:
• External URL Exposure
• Supply Chain Risk
• Credential Management Considerations
|
.github/workflows/soos.yml
Outdated
| name: SOOS SAST Scan | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - uses: actions/checkout@master |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Static Code Analysis Risk: Software and Data Integrity Failures - GitHub actions artipacked vulnerability
Detected local filesystem git credential storage on GitHub Actions, as well as potential avenues for unintentional persistence of credentials in artifacts. By default, using actions/checkout causes a credential to be persisted in the checked-out repo's .git/config, so that subsequent git operations can be authenticated. Subsequent steps may accidentally publicly persist .git/config, e.g. by including it in a publicly accessible artifact via actions/upload-artifact. However, even without this, persisting the credential in the .git/config is non-ideal unless actually needed. To fix, add persist-credentials: false inside a with section in this step.
Severity: Medium
Status: Open 🔴
References:
Suggested reviewers 🧐: @confusedcrib
Take action by replying with an [arnica] command 💬
Actions
Use [arnica] or [a] to interact with the Arnica bot to acknowledge or dismiss code risks.
[arnica] ack <message>
Acknowledge the finding as a valid code risk.
Examples
[arnica] ack looking into it
[a] ack triaged by the security team
[arnica] dismiss <fp|accept|capacity> <message>
Dismiss the risk with a reason.
-
fp: False positive, i.e. the result is incorrect and indicates no actual risk. -
accept: Tolerable risk, i.e. risk severity is lower than what has been reported or is accepted as it stands. -
capacity: No capacity, i.e. leave me alone, please.
Examples
[arnica] dismiss fp test function
[arnica] dismiss accept ChatGPT assures us that we will be just fine
[a] dismiss capacity not enough caffeine to fix it
.github/workflows/soos.yml
Outdated
| name: SOOS SCA Scan | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - uses: actions/checkout@master |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Static Code Analysis Risk: Software and Data Integrity Failures - GitHub actions artipacked vulnerability
Detected local filesystem git credential storage on GitHub Actions, as well as potential avenues for unintentional persistence of credentials in artifacts. By default, using actions/checkout causes a credential to be persisted in the checked-out repo's .git/config, so that subsequent git operations can be authenticated. Subsequent steps may accidentally publicly persist .git/config, e.g. by including it in a publicly accessible artifact via actions/upload-artifact. However, even without this, persisting the credential in the .git/config is non-ideal unless actually needed. To fix, add persist-credentials: false inside a with section in this step.
Severity: Medium
Status: Open 🔴
References:
Suggested reviewers 🧐: @confusedcrib
Take action by replying with an [arnica] command 💬
Actions
Use [arnica] or [a] to interact with the Arnica bot to acknowledge or dismiss code risks.
[arnica] ack <message>
Acknowledge the finding as a valid code risk.
Examples
[arnica] ack looking into it
[a] ack triaged by the security team
[arnica] dismiss <fp|accept|capacity> <message>
Dismiss the risk with a reason.
-
fp: False positive, i.e. the result is incorrect and indicates no actual risk. -
accept: Tolerable risk, i.e. risk severity is lower than what has been reported or is accepted as it stands. -
capacity: No capacity, i.e. leave me alone, please.
Examples
[arnica] dismiss fp test function
[arnica] dismiss accept ChatGPT assures us that we will be just fine
[a] dismiss capacity not enough caffeine to fix it
.github/workflows/soos.yml
Outdated
| name: SOOS SBOM Scan | ||
| runs-on: ubuntu-latest | ||
| steps: | ||
| - uses: actions/checkout@master |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Static Code Analysis Risk: Software and Data Integrity Failures - GitHub actions artipacked vulnerability
Detected local filesystem git credential storage on GitHub Actions, as well as potential avenues for unintentional persistence of credentials in artifacts. By default, using actions/checkout causes a credential to be persisted in the checked-out repo's .git/config, so that subsequent git operations can be authenticated. Subsequent steps may accidentally publicly persist .git/config, e.g. by including it in a publicly accessible artifact via actions/upload-artifact. However, even without this, persisting the credential in the .git/config is non-ideal unless actually needed. To fix, add persist-credentials: false inside a with section in this step.
Severity: Medium
Status: Open 🔴
References:
Suggested reviewers 🧐: @confusedcrib
Take action by replying with an [arnica] command 💬
Actions
Use [arnica] or [a] to interact with the Arnica bot to acknowledge or dismiss code risks.
[arnica] ack <message>
Acknowledge the finding as a valid code risk.
Examples
[arnica] ack looking into it
[a] ack triaged by the security team
[arnica] dismiss <fp|accept|capacity> <message>
Dismiss the risk with a reason.
-
fp: False positive, i.e. the result is incorrect and indicates no actual risk. -
accept: Tolerable risk, i.e. risk severity is lower than what has been reported or is accepted as it stands. -
capacity: No capacity, i.e. leave me alone, please.
Examples
[arnica] dismiss fp test function
[arnica] dismiss accept ChatGPT assures us that we will be just fine
[a] dismiss capacity not enough caffeine to fix it
|
We have finished reviewing your PR. We have found no vulnerabilities. Reply to this PR with |
No description provided.