Skip to content

Commit 1e4634d

Browse files
authored
Bump CSEC java agent release 1.5.1 (#2134)
1 parent 305a4d9 commit 1e4634d

File tree

2 files changed

+65
-60
lines changed

2 files changed

+65
-60
lines changed

gradle.properties

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# The agent version.
22
agentVersion=8.16.0
3-
securityAgentVersion=1.5.0
3+
securityAgentVersion=1.5.1
44

55
newrelicDebug=false
66
org.gradle.jvmargs=-Xmx2048m

newrelic-agent/src/main/resources/newrelic.yml

Lines changed: 64 additions & 59 deletions
Original file line numberDiff line numberDiff line change
@@ -464,66 +464,71 @@ common: &default_settings
464464
agent:
465465
enabled: false
466466

467+
# This configuration allows users to specify a unique test identifier when running IAST Scan with CI/CD
468+
iast_test_identifier: 'run-id'
469+
467470
# Security controllers
468-
scan_controllers:
469-
# The scan_request_rate_limit configuration allows to specify maximum number of replay request played per minute.
470-
# The maximum is 3600 and the minimum is 12 replay request per minute.
471-
iast_scan_request_rate_limit: 3600 # Number of IAST replay request played per minute, Default is 3600
472-
473-
# The scan_schedule configuration allows to specify when IAST scans should be executed
474-
scan_schedule:
475-
# The delay field specifies the delay in minutes before the IAST scan starts. This allows to schedule the scan to start at a later time.
476-
delay: 0 #In minutes, default is 0 min
477-
# The duration field specifies the duration of the IAST scan in minutes. This determines how long the scan will run.
478-
duration: 0 #In minutes, default is forever
479-
480-
# The schedule field specifies a cron expression that defines when the IAST scan should start.
481-
#schedule: "" #By default, schedule is inactive
482-
483-
# Allow continuously sample collection of IAST events
484-
always_sample_traces: false # Default is false
485-
486-
# The exclude_from_iast_scan configuration allows to specify APIs, parameters, and categories that should not be scanned by Security Agents.
487-
exclude_from_iast_scan:
488-
# The api field specifies list of APIs using regular expression (regex) patterns that follow the syntax of Perl 5. The regex pattern should provide a complete match for the URL without the endpoint.
489-
# Example:
490-
# api:
491-
# - .*account.*
492-
# - .*/\api\/v1\/.*?\/login
493-
api: [ ]
494-
495-
# The parameters configuration allows users to specify headers, query parameters, and body keys that should be excluded from IAST scans.
496-
# Example:
497-
# http_request_parameters:
498-
# header:
499-
# - X-Forwarded-For
500-
# query:
501-
# - username
502-
# - password
503-
# body:
504-
# - account.email
505-
# - account.contact
506-
http_request_parameters:
507-
# A list of HTTP header keys. If a request includes any headers with these keys, the corresponding IAST scan will be skipped.
508-
header: [ ]
509-
# A list of query parameter keys. The presence of these parameters in the request's query string will lead to skipping the IAST scan.
510-
query: [ ]
511-
# A list of keys within the request body. If these keys are found in the body content, the IAST scan will be omitted.
512-
body: [ ]
513-
514-
# The iast_detection_category configuration allows to specify which categories of vulnerabilities should not be detected by Security Agents.
515-
# If any of these categories are set to true, Security Agents will not generate events or flag vulnerabilities for that category.
516-
iast_detection_category:
517-
insecure_settings: false
518-
invalid_file_access: false
519-
sql_injection: false
520-
nosql_injection: false
521-
ldap_injection: false
522-
javascript_injection: false
523-
command_injection: false
524-
xpath_injection: false
525-
ssrf: false
526-
rxss: false
471+
scan_controllers:
472+
# The scan_request_rate_limit configuration allows to specify maximum number of replay request played per minute.
473+
# The maximum is 3600 and the minimum is 12 replay request per minute.
474+
iast_scan_request_rate_limit: 3600 # Number of IAST replay request played per minute, Default is 3600
475+
# This configuration allows users to the number of application instances for a specific entity where IAST analysis is performed.
476+
scan_instance_count: 0 # Values are 1 or 0, 0 signifies run on all application instances
477+
478+
# The scan_schedule configuration allows to specify when IAST scans should be executed
479+
scan_schedule:
480+
# The delay field specifies the delay in minutes before the IAST scan starts. This allows to schedule the scan to start at a later time.
481+
delay: 0 #In minutes, default is 0 min
482+
# The duration field specifies the duration of the IAST scan in minutes. This determines how long the scan will run.
483+
duration: 0 #In minutes, default is forever
484+
485+
# The schedule field specifies a cron expression that defines when the IAST scan should start.
486+
#schedule: "" #By default, schedule is inactive
487+
488+
# Allow continuously sample collection of IAST events
489+
always_sample_traces: false # Default is false
490+
491+
# The exclude_from_iast_scan configuration allows to specify APIs, parameters, and categories that should not be scanned by Security Agents.
492+
exclude_from_iast_scan:
493+
# The api field specifies list of APIs using regular expression (regex) patterns that follow the syntax of Perl 5. The regex pattern should provide a complete match for the URL without the endpoint.
494+
# Example:
495+
# api:
496+
# - .*account.*
497+
# - .*/\api\/v1\/.*?\/login
498+
api: [ ]
499+
500+
# The parameters configuration allows users to specify headers, query parameters, and body keys that should be excluded from IAST scans.
501+
# Example:
502+
# http_request_parameters:
503+
# header:
504+
# - X-Forwarded-For
505+
# query:
506+
# - username
507+
# - password
508+
# body:
509+
# - account.email
510+
# - account.contact
511+
http_request_parameters:
512+
# A list of HTTP header keys. If a request includes any headers with these keys, the corresponding IAST scan will be skipped.
513+
header: [ ]
514+
# A list of query parameter keys. The presence of these parameters in the request's query string will lead to skipping the IAST scan.
515+
query: [ ]
516+
# A list of keys within the request body. If these keys are found in the body content, the IAST scan will be omitted.
517+
body: [ ]
518+
519+
# The iast_detection_category configuration allows to specify which categories of vulnerabilities should not be detected by Security Agents.
520+
# If any of these categories are set to true, Security Agents will not generate events or flag vulnerabilities for that category.
521+
iast_detection_category:
522+
insecure_settings: false
523+
invalid_file_access: false
524+
sql_injection: false
525+
nosql_injection: false
526+
ldap_injection: false
527+
javascript_injection: false
528+
command_injection: false
529+
xpath_injection: false
530+
ssrf: false
531+
rxss: false
527532

528533
# Deprecated!!! Instead, please use iast_detection_category to disable vulnerabilities category by IAST,
529534
# These are the category of security events that can be detected. Set to false to disable detection of

0 commit comments

Comments
 (0)