Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: added security KICS scan action #22

Merged
merged 1 commit into from
Sep 10, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
31 changes: 31 additions & 0 deletions .github/workflows/kics_sec_scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
name: Run security KICS scaner

on:
pull_request:
branches:
- main

jobs:
kics:
name: Run security KICS scaner
runs-on: "ubuntu-latest"

steps:
- name: Checkout code repo
uses: actions/checkout@v3

- name: Run security KICS scaner
uses: checkmarx/[email protected]

Check warning on line 18 in .github/workflows/kics_sec_scan.yml

View workflow job for this annotation

GitHub Actions / Run security KICS scaner

[MEDIUM] Unpinned Actions Full Length Commit SHA

Pinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA helps mitigate the risk of a bad actor adding a backdoor to the action's repository, as they would need to generate a SHA-1 collision for a valid Git object payload. When selecting a SHA, you should verify it is from the action's repository and not a repository fork.
with:
path: .
output_path: myResults/
output_formats: 'sarif'
enable_comments: true
enable_annotations: true
ignore_on_exit: results

# TBD
# - name: Upload SARIF file
# uses: github/codeql-action/upload-sarif@v1
# with:
# sarif_file: myResults/results.sarif
Loading