-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GitHub Code Scanning Integration #63
Comments
@SvanBoxel thank you for creating this and telling us about it :) |
There any action here? @psiinon This is very helpful as be able to show these results in the Advanced Security UI (acknowledging the disclaimer) |
This would be fantastic. I would love to see this action enable sarif output as well so an intermediate step/action is not needed. |
Ran into this requirement recently so I took a quick stab at hacking out a solution to let us proceed and I'd very much like to help make this be part of the main action without requiring an additional action to be used. My understanding is that this would require changes to this repo (#110) & In my case I had to create a new docker image with these files updated ( Would gladly take suggestions / work on produtionizing the code if this path doesn't seem to out there.. would require input from folks who are far more knowledgable than I (@psiinon or any others) |
With a scan hook you could create the report without doing changes everywhere: https://www.zaproxy.org/docs/docker/scan-hooks/ |
Wondering if that solve makes sense for folks supporting 100s of applications and needing to add that hook.py file to all repos. Was mostly hoping for it to be supported with a command line option |
The hook can be created by the workflow and one can use reusable workflows, so no need to add a file to 100s repos. It's not necessary to add a command line option when this can be implemented just in the action (or the common package). |
ack. My issue with that solution is that it requires something beyond the baseline scan options that come out of the box. Seems like a workaround to use a hook rather than have something supported properly in the main action. Definitely not a fan of that solution but if the guidance is to not support sairf within the baseline scan in the future I guess we will go with the gross hook solve / keep rolling our own docker image + maintain our own fork |
What do you want to use? The action or the packaged scan? Both? |
My understanding from the docs was that
doesn't the Ideally it would be great to have sarif support figured out in the action here now and then make the change to move the AF completely seamless and update the old |
Looks like a SARIF report exporter is already part of ZAP. See
Sadly I didn't find a way/documentation to use it. |
Find an idea at GSA-TTS/FAC#1654 |
👋🏽 ZAproxy team,
Thank you for building this Action. I took the liberty to create an actions that maps the ZAProxy results to SARIF so they can be displayed in the GitHub Advanced Security UI.
You can check it out here: https://github.com/SvanBoxel/zaproxy-to-ghas
Optionally we could decide to merge this action into
zaproxy/action-baseline
so it becomes easier for users to leverage this scanning utility.Disclaimer: I know, SARIF isn’t made for DAST results, but having the ability to view all security results through a single pane of glass can be very beneficial.
The text was updated successfully, but these errors were encountered: