Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add security scan for the repository #650

Merged
merged 1 commit into from
Jan 13, 2023
Merged

Conversation

JAORMX
Copy link
Contributor

@JAORMX JAORMX commented Jan 13, 2023

This does a security scan for hardcoded secrets and vulnerable software
dependencies. This will hopefully help us prioritize dependency updates
in such a way that we don't keep vulnerable dependencies for too long.
Note that this should only be detecting HIGH and CRITICAL
vulnerabilities as to not overwhelm the team with warnings.

Signed-off-by: Juan Antonio Osorio [email protected]

This does a security scan for hardcoded secrets and vulnerable software
dependencies. This will hopefully help us prioritize dependency updates
in such a way that we don't keep vulnerable dependencies for too long.
Note that this should only be detecting `HIGH` and `CRITICAL`
vulnerabilities as to not overwhelm the team with warnings.

Signed-off-by: Juan Antonio Osorio <[email protected]>
@kpacha kpacha merged commit 5c471f0 into krakend:master Jan 13, 2023
@JAORMX JAORMX deleted the sec-scan branch January 17, 2023 09:23
JAORMX added a commit to JAORMX/krakend-ce that referenced this pull request Jan 17, 2023
This adds a step in the GitHub Actions CI to automatically build the
krakend-ce and builder images and run a security scan on them.

Similarly to the repository scans introduced in a previous PR [1], this
uses Trivy [2] to run the scans, which allows us to add exceptions if
vulnerabilities are not relevant to these images.

[1] krakend#650
[2] https://aquasecurity.github.io/trivy/v0.35/

Signed-off-by: Juan Antonio Osorio <[email protected]>
JAORMX added a commit to JAORMX/krakend-ce that referenced this pull request Jan 17, 2023
This adds a step in the GitHub Actions CI to automatically build the
krakend-ce and builder images and run a security scan on them.

Similarly to the repository scans introduced in a previous PR [1], this
uses Trivy [2] to run the scans, which allows us to add exceptions if
vulnerabilities are not relevant to these images.

[1] krakend#650
[2] https://aquasecurity.github.io/trivy/v0.35/

Signed-off-by: Juan Antonio Osorio <[email protected]>
JAORMX added a commit to JAORMX/krakend-ce that referenced this pull request Jan 17, 2023
This adds a step in the GitHub Actions CI to automatically build the
krakend-ce and builder images and run a security scan on them.

Similarly to the repository scans introduced in a previous PR [1], this
uses Trivy [2] to run the scans, which allows us to add exceptions if
vulnerabilities are not relevant to these images.

[1] krakend#650
[2] https://aquasecurity.github.io/trivy/v0.35/

Signed-off-by: Juan Antonio Osorio <[email protected]>
JAORMX added a commit to JAORMX/krakend-ce that referenced this pull request Jan 17, 2023
This adds a step in the GitHub Actions CI to automatically build the
krakend-ce and builder images and run a security scan on them.

Similarly to the repository scans introduced in a previous PR [1], this
uses Trivy [2] to run the scans, which allows us to add exceptions if
vulnerabilities are not relevant to these images.

[1] krakend#650
[2] https://aquasecurity.github.io/trivy/v0.35/

Signed-off-by: Juan Antonio Osorio <[email protected]>
@github-actions
Copy link

This pull request was marked as resolved a long time ago and now has been automatically locked as there has not been any recent activity after it. You can still open a new issue and reference this link.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Apr 17, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants