1
+ # This workflow uses actions that are not certified by GitHub.
2
+ # They are provided by a third-party and are governed by
3
+ # separate terms of service, privacy policy, and support
4
+ # documentation.
5
+
6
+ # GitHub recommends pinning actions to a commit SHA.
7
+ # To get a newer version, you will need to update the SHA.
8
+ # You can also reference a tag or branch, but the action may change without warning.
9
+
10
+ name : " Security C4PO Pentest Pipeline PoC"
11
+
12
+ on :
13
+ pull_request :
14
+ branches : [ "main" ]
15
+
16
+ # on:
17
+ # schedule:
18
+ # Runs every sunday at 00:00.
19
+ # - cron: '0 0 * * 0'
20
+
21
+ env :
22
+ ANGULAR_PATH : security-c4po-angular
23
+ API_PATH : security-c4po-api
24
+ REPORTING_PATH : security-c4po-reporting
25
+ CFG_PATH : security-c4po-cfg
26
+
27
+ ANGULAR_CLI_VERSION : 13
28
+
29
+
30
+ jobs :
31
+
32
+ zap_baseline_scan :
33
+ name : " ZAP Baseline Job"
34
+
35
+ runs-on : ubuntu-latest
36
+
37
+ steps :
38
+
39
+ - name : " ZAP Baseline Scan"
40
+ # Focuses on identifying common and high impact vulnerabilites.
41
+ # Designed to catch low hanging fruit & well-known security issues (XXS, SQL-Injection, ...)
42
+ uses : zaproxy/action-baseline@v0.9.0
43
+ with :
44
+ token : ${{ secrets.GITHUB_TOKEN }}
45
+ docker_name : ' ghcr.io/zaproxy/zaproxy:stable'
46
+ target : ' https://security.c4po.dev'
47
+ rules_file_name : ' .zap/rules.tsv'
48
+ artifact_name : zap_baseline_scan
49
+ cmd_options : ' -a'
50
+
51
+ zap_api_scan :
52
+ name : " ZAP API Job"
53
+
54
+ runs-on : ubuntu-latest
55
+
56
+ steps :
57
+
58
+ - name : " ZAP API Scan"
59
+ # Focuses on scanning RESTful APIs
60
+ # Optional: The format of the defintion, openapi, soap, or graphql. (Default is openapi)
61
+ # Looks for a wide range of vulnerabilities (SQL-Injections, authentication issues, insecure direct object references, ...)
62
+ uses : zaproxy/action-api-scan@v0.5.0
63
+ with :
64
+ token : ${{ secrets.GITHUB_TOKEN }}
65
+ docker_name : ' ghcr.io/zaproxy/zaproxy:stable'
66
+ format : openapi
67
+ target : ' https://security.c4po.dev'
68
+ rules_file_name : ' .zap/rules.tsv'
69
+ artifact_name : zap_api_scan
70
+ cmd_options : ' -a'
71
+
72
+ # zap_full_scan:
73
+ # name: "ZAP Full Scan"
74
+
75
+ # runs-on: ubuntu-latest
76
+
77
+ # steps:
78
+
79
+ # - name: "ZAP Full Scan"
80
+ # Focuses on comprehensive and thorough security assessment of web-application.
81
+ # Scan includes passive & active scanning, spidering and more in-depth checks for vulnerabilities.
82
+ # uses: zaproxy/action-full-scan@v0.7.0
83
+ # with:
84
+ # token: ${{ secrets.GITHUB_TOKEN }}
85
+ # docker_name: 'ghcr.io/zaproxy/zaproxy:stable'
86
+ # target: 'https://security.c4po.dev'
87
+ # rules_file_name: '.zap/rules.tsv'
88
+ # artifact_name: zap_full_scan
89
+ # cmd_options: '-a'
0 commit comments