mirror of
https://github.com/actions/github-script.git
synced 2026-02-08 03:57:27 +00:00
Merge 2ad61e168e into ed597411d8
This commit is contained in:
commit
db5eb9c9c8
7 changed files with 390 additions and 0 deletions
61
.github/workflows/codacy.yml
vendored
Normal file
61
.github/workflows/codacy.yml
vendored
Normal file
|
|
@ -0,0 +1,61 @@
|
||||||
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
|
# They are provided by a third-party and are governed by
|
||||||
|
# separate terms of service, privacy policy, and support
|
||||||
|
# documentation.
|
||||||
|
|
||||||
|
# This workflow checks out code, performs a Codacy security scan
|
||||||
|
# and integrates the results with the
|
||||||
|
# GitHub Advanced Security code scanning feature. For more information on
|
||||||
|
# the Codacy security scan action usage and parameters, see
|
||||||
|
# https://github.com/codacy/codacy-analysis-cli-action.
|
||||||
|
# For more information on Codacy Analysis CLI in general, see
|
||||||
|
# https://github.com/codacy/codacy-analysis-cli.
|
||||||
|
|
||||||
|
name: Codacy Security Scan
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ "main" ]
|
||||||
|
pull_request:
|
||||||
|
# The branches below must be a subset of the branches above
|
||||||
|
branches: [ "main" ]
|
||||||
|
schedule:
|
||||||
|
- cron: '29 5 * * 3'
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
codacy-security-scan:
|
||||||
|
permissions:
|
||||||
|
contents: read # for actions/checkout to fetch code
|
||||||
|
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
|
||||||
|
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
|
||||||
|
name: Codacy Security Scan
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
# Checkout the repository to the GitHub Actions runner
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis
|
||||||
|
- name: Run Codacy Analysis CLI
|
||||||
|
uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b
|
||||||
|
with:
|
||||||
|
# Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository
|
||||||
|
# You can also omit the token and run the tools that support default configurations
|
||||||
|
project-token: ${{ secrets.CODACY_PROJECT_TOKEN }}
|
||||||
|
verbose: true
|
||||||
|
output: results.sarif
|
||||||
|
format: sarif
|
||||||
|
# Adjust severity of non-security issues
|
||||||
|
gh-code-scanning-compat: true
|
||||||
|
# Force 0 exit code to allow SARIF file generation
|
||||||
|
# This will handover control about PR rejection to the GitHub side
|
||||||
|
max-allowed-issues: 2147483647
|
||||||
|
|
||||||
|
# Upload the SARIF file generated in the previous step
|
||||||
|
- name: Upload SARIF results file
|
||||||
|
uses: github/codeql-action/upload-sarif@v3
|
||||||
|
with:
|
||||||
|
sarif_file: results.sarif
|
||||||
47
.github/workflows/defender-for-devops.yml
vendored
Normal file
47
.github/workflows/defender-for-devops.yml
vendored
Normal file
|
|
@ -0,0 +1,47 @@
|
||||||
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
|
# They are provided by a third-party and are governed by
|
||||||
|
# separate terms of service, privacy policy, and support
|
||||||
|
# documentation.
|
||||||
|
#
|
||||||
|
# Microsoft Security DevOps (MSDO) is a command line application which integrates static analysis tools into the development cycle.
|
||||||
|
# MSDO installs, configures and runs the latest versions of static analysis tools
|
||||||
|
# (including, but not limited to, SDL/security and compliance tools).
|
||||||
|
#
|
||||||
|
# The Microsoft Security DevOps action is currently in beta and runs on the windows-latest queue,
|
||||||
|
# as well as Windows self hosted agents. ubuntu-latest support coming soon.
|
||||||
|
#
|
||||||
|
# For more information about the action , check out https://github.com/microsoft/security-devops-action
|
||||||
|
#
|
||||||
|
# Please note this workflow do not integrate your GitHub Org with Microsoft Defender For DevOps. You have to create an integration
|
||||||
|
# and provide permission before this can report data back to azure.
|
||||||
|
# Read the official documentation here : https://learn.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-github
|
||||||
|
|
||||||
|
name: "Microsoft Defender For Devops"
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ "main" ]
|
||||||
|
pull_request:
|
||||||
|
branches: [ "main" ]
|
||||||
|
schedule:
|
||||||
|
- cron: '28 13 * * 5'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
MSDO:
|
||||||
|
# currently only windows latest is supported
|
||||||
|
runs-on: windows-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
- uses: actions/setup-dotnet@v4
|
||||||
|
with:
|
||||||
|
dotnet-version: |
|
||||||
|
5.0.x
|
||||||
|
6.0.x
|
||||||
|
- name: Run Microsoft Security DevOps
|
||||||
|
uses: microsoft/security-devops-action@v1.6.0
|
||||||
|
id: msdo
|
||||||
|
- name: Upload results to Security tab
|
||||||
|
uses: github/codeql-action/upload-sarif@v3
|
||||||
|
with:
|
||||||
|
sarif_file: ${{ steps.msdo.outputs.sarifFile }}
|
||||||
52
.github/workflows/eslint.yml
vendored
Normal file
52
.github/workflows/eslint.yml
vendored
Normal file
|
|
@ -0,0 +1,52 @@
|
||||||
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
|
# They are provided by a third-party and are governed by
|
||||||
|
# separate terms of service, privacy policy, and support
|
||||||
|
# documentation.
|
||||||
|
# ESLint is a tool for identifying and reporting on patterns
|
||||||
|
# found in ECMAScript/JavaScript code.
|
||||||
|
# More details at https://github.com/eslint/eslint
|
||||||
|
# and https://eslint.org
|
||||||
|
|
||||||
|
name: ESLint
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ "main" ]
|
||||||
|
pull_request:
|
||||||
|
# The branches below must be a subset of the branches above
|
||||||
|
branches: [ "main" ]
|
||||||
|
schedule:
|
||||||
|
- cron: '28 20 * * 2'
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
eslint:
|
||||||
|
name: Run eslint scanning
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
security-events: write
|
||||||
|
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
|
||||||
|
steps:
|
||||||
|
- name: Checkout code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Install ESLint
|
||||||
|
run: |
|
||||||
|
npm install eslint@8.10.0
|
||||||
|
npm install @microsoft/eslint-formatter-sarif@3.1.0
|
||||||
|
|
||||||
|
- name: Run ESLint
|
||||||
|
env:
|
||||||
|
SARIF_ESLINT_IGNORE_SUPPRESSED: "true"
|
||||||
|
run: npx eslint .
|
||||||
|
--config .eslintrc.js
|
||||||
|
--ext .js,.jsx,.ts,.tsx
|
||||||
|
--format @microsoft/eslint-formatter-sarif
|
||||||
|
--output-file eslint-results.sarif
|
||||||
|
continue-on-error: true
|
||||||
|
|
||||||
|
- name: Upload analysis results to GitHub
|
||||||
|
uses: github/codeql-action/upload-sarif@v3
|
||||||
|
with:
|
||||||
|
sarif_file: eslint-results.sarif
|
||||||
|
wait-for-processing: true
|
||||||
49
.github/workflows/semgrep.yml
vendored
Normal file
49
.github/workflows/semgrep.yml
vendored
Normal file
|
|
@ -0,0 +1,49 @@
|
||||||
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
|
# They are provided by a third-party and are governed by
|
||||||
|
# separate terms of service, privacy policy, and support
|
||||||
|
# documentation.
|
||||||
|
|
||||||
|
# This workflow file requires a free account on Semgrep.dev to
|
||||||
|
# manage rules, file ignores, notifications, and more.
|
||||||
|
#
|
||||||
|
# See https://semgrep.dev/docs
|
||||||
|
|
||||||
|
name: Semgrep
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ "main" ]
|
||||||
|
pull_request:
|
||||||
|
# The branches below must be a subset of the branches above
|
||||||
|
branches: [ "main" ]
|
||||||
|
schedule:
|
||||||
|
- cron: '15 7 * * 5'
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
semgrep:
|
||||||
|
permissions:
|
||||||
|
contents: read # for actions/checkout to fetch code
|
||||||
|
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
|
||||||
|
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
|
||||||
|
name: Scan
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
# Checkout project source
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
|
||||||
|
# Scan code using project's configuration on https://semgrep.dev/manage
|
||||||
|
- uses: returntocorp/semgrep-action@fcd5ab7459e8d91cb1777481980d1b18b4fc6735
|
||||||
|
with:
|
||||||
|
publishToken: ${{ secrets.SEMGREP_APP_TOKEN }}
|
||||||
|
publishDeployment: ${{ secrets.SEMGREP_DEPLOYMENT_ID }}
|
||||||
|
generateSarif: "1"
|
||||||
|
|
||||||
|
# Upload SARIF file generated in previous step
|
||||||
|
- name: Upload SARIF file
|
||||||
|
uses: github/codeql-action/upload-sarif@v3
|
||||||
|
with:
|
||||||
|
sarif_file: semgrep.sarif
|
||||||
|
if: always()
|
||||||
100
.github/workflows/xanitizer.yml
vendored
Normal file
100
.github/workflows/xanitizer.yml
vendored
Normal file
|
|
@ -0,0 +1,100 @@
|
||||||
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
|
# They are provided by a third-party and are governed by
|
||||||
|
# separate terms of service, privacy policy, and support
|
||||||
|
# documentation.
|
||||||
|
|
||||||
|
# This workflow downloads and installs the latest version of Xanitizer, builds your project, runs a Xanitizer security analysis on it,
|
||||||
|
# and then archives the findings list reports and uploads the findings into the GitHub code scanning alert section of your repository.
|
||||||
|
#
|
||||||
|
# Documentation for the `RIGS-IT/xanitizer-action` is located here: https://github.com/RIGS-IT/xanitizer-action
|
||||||
|
#
|
||||||
|
# To use this basic workflow, you will need to complete the following setup steps:
|
||||||
|
#
|
||||||
|
# 1. The underlying Xanitizer, used in this workflow, needs a separate license file.
|
||||||
|
# Licenses are free of charge for open source projects and for educational usage.
|
||||||
|
# To get more information about the Xanitizer licenses and how to obtain a license file,
|
||||||
|
# please consult https://www.xanitizer.com/xanitizer-pricing/.
|
||||||
|
#
|
||||||
|
# 2. The content of the license file has to be stored as a GitHub secret (e.g. XANITIZER_LICENSE) on this repository.
|
||||||
|
# Please consult https://docs.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets for details.
|
||||||
|
#
|
||||||
|
# 3. Reference the GitHub secret in the step using the `RIGS-IT/xanitizer-action` GitHub action.
|
||||||
|
# Example:
|
||||||
|
# - name: Xanitizer Security Analysis
|
||||||
|
# uses: RIGS-IT/xanitizer-action@v1
|
||||||
|
# with:
|
||||||
|
# license: ${{ secrets.XANITIZER_LICENSE }}
|
||||||
|
#
|
||||||
|
# 4. As a static application security testing (SAST) tool,
|
||||||
|
# Xanitizer requires that all dependencies of the artifacts being analyzed can be resolved successfully.
|
||||||
|
# So you have to install all used libraries and build your project before running the security analysis,
|
||||||
|
# e.g. via `mvn compile` for Java or `npm install` for JavaScript
|
||||||
|
|
||||||
|
name: "Xanitizer Security Analysis"
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ "main" ]
|
||||||
|
pull_request:
|
||||||
|
# The branches below must be a subset of the branches above
|
||||||
|
branches: [ "main" ]
|
||||||
|
schedule:
|
||||||
|
- cron: '28 14 * * 6'
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
xanitizer-security-analysis:
|
||||||
|
# Xanitizer runs on ubuntu-latest and windows-latest.
|
||||||
|
permissions:
|
||||||
|
contents: read # for actions/checkout to fetch code
|
||||||
|
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
|
||||||
|
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
|
||||||
|
steps:
|
||||||
|
# Check out the repository
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
# Set up the correct Java version for your project
|
||||||
|
# Please comment out, if your project does not contain Java source code.
|
||||||
|
- name: Set up JDK 11
|
||||||
|
uses: actions/setup-java@v4
|
||||||
|
with:
|
||||||
|
java-version: 11
|
||||||
|
distribution: 'temurin'
|
||||||
|
|
||||||
|
# Compile the code for Java projects and get all libraries, e.g. via Maven
|
||||||
|
# Please adapt, if your project uses another build system to compile Java source code.
|
||||||
|
# Please comment out, if your project does not contain Java source code.
|
||||||
|
- name: Compile Java code
|
||||||
|
run: mvn -B compile
|
||||||
|
|
||||||
|
# Install all dependent libraries for JavaScript/TypeScript projects, e.g. via npm
|
||||||
|
# Please adapt to run `npm install` in the correct directories.
|
||||||
|
# Please adapt, if your project uses another package manager for getting JavaScript libraries.
|
||||||
|
# Please comment out, if your project does not use a package manager for getting JavaScript libraries.
|
||||||
|
- name: Install JavaScript libraries
|
||||||
|
run: npm install
|
||||||
|
|
||||||
|
# Run the security analysis with default settings
|
||||||
|
- name: Xanitizer Security Analysis
|
||||||
|
uses: RIGS-IT/xanitizer-action@87d13138fb113b727cbe040c744a15a2b4fe5316
|
||||||
|
with:
|
||||||
|
license: ${{ secrets.XANITIZER_LICENSE }}
|
||||||
|
|
||||||
|
# Archiving the findings list reports
|
||||||
|
- uses: actions/upload-artifact@v4
|
||||||
|
with:
|
||||||
|
name: Xanitizer-Reports
|
||||||
|
path: |
|
||||||
|
*-Findings-List.pdf
|
||||||
|
*-Findings-List.sarif
|
||||||
|
|
||||||
|
# Uploads the findings into the GitHub code scanning alert section using the upload-sarif action
|
||||||
|
- uses: github/codeql-action/upload-sarif@v3
|
||||||
|
with:
|
||||||
|
sarif_file: Xanitizer-Findings-List.sarif
|
||||||
60
.github/workflows/zscan.yml
vendored
Normal file
60
.github/workflows/zscan.yml
vendored
Normal file
|
|
@ -0,0 +1,60 @@
|
||||||
|
# This workflow uses actions that are not certified by GitHub.
|
||||||
|
# They are provided by a third-party and are governed by
|
||||||
|
# separate terms of service, privacy policy, and support
|
||||||
|
# documentation.
|
||||||
|
#
|
||||||
|
# The zimperium-zscan GitHub action scans your mobile app binary (iOS or Android)
|
||||||
|
# and identifies security, privacy, and compliance-related vulnerabilities.
|
||||||
|
#
|
||||||
|
# Prerequisites:
|
||||||
|
# * An active Zimperium zScan account is required. If you are not an existing Zimperium
|
||||||
|
# zScan customer, please request a zSCAN demo by visiting https://www.zimperium.com/contact-us.
|
||||||
|
# * Either GitHub Advanced Security (GHAS) or a public repository is required to display
|
||||||
|
# issues and view the remediation information inside of GitHub code scanning alerts.
|
||||||
|
#
|
||||||
|
# For additional information and setup instructions
|
||||||
|
# please visit: https://github.com/Zimperium/zScanMarketplace#readme
|
||||||
|
|
||||||
|
name: "Zimperium zScan"
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
branches: [ "main" ]
|
||||||
|
pull_request:
|
||||||
|
branches: [ "main" ]
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
contents: read
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
zscan:
|
||||||
|
name: zScan
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
permissions:
|
||||||
|
contents: read # for actions/checkout to fetch code
|
||||||
|
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
|
||||||
|
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
|
||||||
|
steps:
|
||||||
|
- name: Checkout repository
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
|
||||||
|
- name: Execute gradle build
|
||||||
|
run: ./gradlew build # Change this to build your mobile application
|
||||||
|
|
||||||
|
- name: Run Zimperium zScan
|
||||||
|
uses: zimperium/zscanmarketplace@bfc6670f6648d796098c251ccefcfdb98983174d
|
||||||
|
timeout-minutes: 60
|
||||||
|
with:
|
||||||
|
# REPLACE: Zimperium Client Environment Name
|
||||||
|
client_env: env_string
|
||||||
|
# REPLACE: Zimperium Client ID
|
||||||
|
client_id: id_string
|
||||||
|
# REPLACE: Zimperium Client Secret
|
||||||
|
client_secret: ${{ secrets.ZSCAN_CLIENT_SECRET }}
|
||||||
|
# REPLACE: The path to an .ipa or .apk
|
||||||
|
app_file: app-release-unsigned.apk
|
||||||
|
|
||||||
|
- name: Upload SARIF file
|
||||||
|
uses: github/codeql-action/upload-sarif@v3
|
||||||
|
with:
|
||||||
|
sarif_file: Zimperium.sarif
|
||||||
21
SECURITY.md
Normal file
21
SECURITY.md
Normal file
|
|
@ -0,0 +1,21 @@
|
||||||
|
# Security Policy
|
||||||
|
|
||||||
|
## Supported Versions
|
||||||
|
|
||||||
|
Use this section to tell people about which versions of your project are
|
||||||
|
currently being supported with security updates.
|
||||||
|
|
||||||
|
| Version | Supported |
|
||||||
|
| ------- | ------------------ |
|
||||||
|
| 5.1.x | :white_check_mark: |
|
||||||
|
| 5.0.x | :x: |
|
||||||
|
| 4.0.x | :white_check_mark: |
|
||||||
|
| < 4.0 | :x: |
|
||||||
|
|
||||||
|
## Reporting a Vulnerability
|
||||||
|
|
||||||
|
Use this section to tell people how to report a vulnerability.
|
||||||
|
|
||||||
|
Tell them where to go, how often they can expect to get an update on a
|
||||||
|
reported vulnerability, what to expect if the vulnerability is accepted or
|
||||||
|
declined, etc.
|
||||||
Loading…
Reference in a new issue