Skip to content

Commit 9d3e407

Browse files
committed
feat: PoC - Pentest Pipeline with OWASP ZAP
1 parent 1888a98 commit 9d3e407

File tree

3 files changed

+93
-3
lines changed

3 files changed

+93
-3
lines changed

.github/workflows/c4po-ci.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,10 @@
1010
name: "Security C4PO CI"
1111

1212
on:
13-
pull_request:
13+
# ToDo: Change "push" back to "pull_request" before integration
14+
push:
1415
branches: [ "main" ]
1516

16-
1717
env:
1818
ANGULAR_PATH: security-c4po-angular
1919
API_PATH: security-c4po-api

.github/workflows/c4po-pentest.yml

Lines changed: 89 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,89 @@
1+
# This workflow uses actions that are not certified by GitHub.
2+
# They are provided by a third-party and are governed by
3+
# separate terms of service, privacy policy, and support
4+
# documentation.
5+
6+
# GitHub recommends pinning actions to a commit SHA.
7+
# To get a newer version, you will need to update the SHA.
8+
# You can also reference a tag or branch, but the action may change without warning.
9+
10+
name: "Security C4PO Pentest Pipeline PoC"
11+
12+
on:
13+
pull_request:
14+
branches: [ "main" ]
15+
16+
#on:
17+
# schedule:
18+
# Runs every sunday at 00:00.
19+
#- cron: '0 0 * * 0'
20+
21+
env:
22+
ANGULAR_PATH: security-c4po-angular
23+
API_PATH: security-c4po-api
24+
REPORTING_PATH: security-c4po-reporting
25+
CFG_PATH: security-c4po-cfg
26+
27+
ANGULAR_CLI_VERSION: 13
28+
29+
30+
jobs:
31+
32+
zap_baseline_scan:
33+
name: "ZAP Baseline Job"
34+
35+
runs-on: ubuntu-latest
36+
37+
steps:
38+
39+
- name: "ZAP Baseline Scan"
40+
# Focuses on identifying common and high impact vulnerabilites.
41+
# Designed to catch low hanging fruit & well-known security issues (XXS, SQL-Injection, ...)
42+
uses: zaproxy/action-baseline@v0.9.0
43+
with:
44+
token: ${{ secrets.GITHUB_TOKEN }}
45+
docker_name: 'ghcr.io/zaproxy/zaproxy:stable'
46+
target: 'https://security.c4po.dev'
47+
rules_file_name: '.zap/rules.tsv'
48+
artifact_name: zap_baseline_scan
49+
cmd_options: '-a'
50+
51+
zap_api_scan:
52+
name: "ZAP API Job"
53+
54+
runs-on: ubuntu-latest
55+
56+
steps:
57+
58+
- name: "ZAP API Scan"
59+
# Focuses on scanning RESTful APIs
60+
# Optional: The format of the defintion, openapi, soap, or graphql. (Default is openapi)
61+
# Looks for a wide range of vulnerabilities (SQL-Injections, authentication issues, insecure direct object references, ...)
62+
uses: zaproxy/action-api-scan@v0.5.0
63+
with:
64+
token: ${{ secrets.GITHUB_TOKEN }}
65+
docker_name: 'ghcr.io/zaproxy/zaproxy:stable'
66+
format: openapi
67+
target: 'https://security.c4po.dev'
68+
rules_file_name: '.zap/rules.tsv'
69+
artifact_name: zap_api_scan
70+
cmd_options: '-a'
71+
72+
#zap_full_scan:
73+
# name: "ZAP Full Scan"
74+
75+
# runs-on: ubuntu-latest
76+
77+
# steps:
78+
79+
# - name: "ZAP Full Scan"
80+
# Focuses on comprehensive and thorough security assessment of web-application.
81+
# Scan includes passive & active scanning, spidering and more in-depth checks for vulnerabilities.
82+
# uses: zaproxy/action-full-scan@v0.7.0
83+
# with:
84+
# token: ${{ secrets.GITHUB_TOKEN }}
85+
# docker_name: 'ghcr.io/zaproxy/zaproxy:stable'
86+
# target: 'https://security.c4po.dev'
87+
# rules_file_name: '.zap/rules.tsv'
88+
# artifact_name: zap_full_scan
89+
# cmd_options: '-a'

.github/workflows/c4po-release.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,8 @@ name: "Publish C4PO Docker Hub"
1111

1212
on:
1313
push:
14-
branches: [ "main" ]
14+
# ToDo: Change back to main before integration
15+
branches: [ "test" ]
1516

1617
env:
1718
ANGULAR_PATH: security-c4po-angular

0 commit comments

Comments
 (0)