Skip to content

Releases: cloudon-one/git-security-scanner-public

Fix public image pull for marketplace usage

08 Apr 08:46
Immutable release. Only release title and notes can be modified.
822e7ba

Choose a tag to compare

v2

22 Nov 20:50
Immutable release. Only release title and notes can be modified.
a0f53ac

Choose a tag to compare

Security Improvements

  • Supply Chain Security: Added SHA256 checksum verification for all downloaded security tools (Gitleaks, Trivy, OSV-Scanner, Helm) in the Dockerfile. This ensures that the binaries are authentic and have not been tampered with.
  • Bug Fixes: Fixed Docker build errors by adding correct multi-arch checksums for all security tools.

Maintenance & Code Quality

  • Unit Tests: Added a comprehensive unit test suite for git-audit-script.py to ensure reliability and prevent regressions.
  • Development Tools: Added a Makefile to streamline building, testing, and running the scanner locally.
  • Code Quality: Refactored git-audit-script.py to improve readability, added type hints, and fixed all linting errors (Ruff).
  • Documentation: Updated README and documentation for v2.0.0.

Git Security Scanner

27 Aug 14:09

Choose a tag to compare

First Stable Release

We're excited to announce the first stable release of Git Security Scanner - a comprehensive security scanning GitHub Action that helps protect your repositories from secrets, vulnerabilities, and misconfigurations.

Key Features

Multi-Tool Security Scanning**

  • Gitleaks v8.28.0 for secret detection (API keys, passwords, tokens)

  • Trivy v0.65.0 for vulnerability and misconfiguration scanning

  • Comprehensive coverage of code, dependencies, and IaC files

  • ** Rich Reporting**

    • Multiple output formats: JSON, HTML, and SARIF
    • Automatic upload to GitHub Security tab
    • Detailed metrics and risk assessment
  • ** Seamless CI/CD Integration**

    • Zero-configuration setup with sensible defaults
    • Automatic PR comments with security summaries
    • Configurable quality gates to fail builds on critical issues
  • ** Actionable Outputs**

    • Risk level assessment (CRITICAL, HIGH, MEDIUM, LOW)
    • Categorized issue counts by severity
    • Direct links to detailed security reports

What This Release Includes

  • Initial GitHub Action implementation with composite steps
  • Docker-based scanning engine with Gitleaks and Trivy
  • Automated security report generation in multiple formats
  • GitHub Security tab integration via SARIF upload
  • Pull request comment automation
  • Configurable build failure on critical issues
  • Comprehensive output variables for workflow integration

Configuration Options

  • github_token: GitHub token for API access (default: ${{ github.token }})
  • fail_on_critical: Fail build on critical issues (default: true)
  • scan_type: Type of scan - all, gitleaks, or trivy (default: all)
  • repository_path: Path to scan (default: .)
  • upload_sarif: Upload SARIF to GitHub Security tab (default: true)
  • create_pr_comment: Create PR comments (default: true)
  • scanner_version: Scanner image version (default: latest)

Infrastructure

  • Containerized scanning using GitHub Container Registry (ghcr.io)
  • Automatic image selection with fallback mechanisms
  • Support for branch-specific and PR-specific container images
  • Optimized for GitHub Actions runners

Technical Details

  • Base Image: Alpine Linux with Python 3.12
  • Security Tools: Gitleaks v8.28.0, Trivy v0.65.0
  • Report Formats: JSON, HTML, SARIF
  • Container Registry: ghcr.io/cloudon-one/git-security-scanner

Acknowledgments

Built with industry-leading open source security tools: