-
Notifications
You must be signed in to change notification settings - Fork 1.6k
TREAT MELIKE YOUR PET #1749
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
ShayneMichaelBacik1
wants to merge
10
commits into
vysheng:master
Choose a base branch
from
ShayneMichaelBacik1:master
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
TREAT MELIKE YOUR PET #1749
Changes from all commits
Commits
Show all changes
10 commits
Select commit
Hold shift + click to select a range
f13716b
Create dependabot.yml
ShayneMichaelBacik1 9ed224e
Create codacy.yml
ShayneMichaelBacik1 9a1dd58
Create apisec-scan.yml
ShayneMichaelBacik1 8d76d79
Create codeql.yml
ShayneMichaelBacik1 6ca8063
Create checkmarx.yml
ShayneMichaelBacik1 39cd4f9
Update .github/workflows/codeql.yml
ShayneMichaelBacik1 6fa1ecd
Create fortify.yml
ShayneMichaelBacik1 7126da9
Create stackhawk.yml
ShayneMichaelBacik1 02611b5
Create brakeman.yml
ShayneMichaelBacik1 f1869a3
flawless finder.yml
ShayneMichaelBacik1 File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
# To get started with Dependabot version updates, you'll need to specify which | ||
# package ecosystems to update and where the package manifests are located. | ||
# Please see the documentation for all configuration options: | ||
# https://docs.github.com/github/administering-a-repository/configuration-options-for-dependency-updates | ||
|
||
version: 2 | ||
updates: | ||
- package-ecosystem: "" # See documentation for possible values | ||
directory: "/" # Location of package manifests | ||
schedule: | ||
interval: "daily" | ||
Start{run}="boolean" | ||
{1}"Create pathway"="true <OPEN>=[GATEWAY]+{OPERATE}&"DELIVERBOTS"<?.://equal_OP_OP1 <SEND>{Directory}to[platform] | ||
{RUN}+[START]<1>,<2>,<3>,{ACTIONS} | ||
{{.://https://coinbase.com/accoounnt/@shaynebacik<Equal Shares>,"profit gains",Profit margins","Shared profits","Rewards"="true" | ||
[SUPPLY]=$1,000,000.00(USD),://https://coinbase.com/@shaynebacik {Deposits},{transfers},{rewards},{profits},{gains},{shared income}="true"> | ||
{open},[START],{COMMITS}="APPROVED" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,69 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
# APIsec addresses the critical need to secure APIs before they reach production. | ||
# APIsec provides the industry’s only automated and continuous API testing platform that uncovers security vulnerabilities and logic flaws in APIs. | ||
# Clients rely on APIsec to evaluate every update and release, ensuring that no APIs go to production with vulnerabilities. | ||
|
||
# How to Get Started with APIsec.ai | ||
# 1. Schedule a demo at https://www.apisec.ai/request-a-demo . | ||
# | ||
# 2. Register your account at https://cloud.fxlabs.io/#/signup . | ||
# | ||
# 3. Register your API . See the video (https://www.youtube.com/watch?v=MK3Xo9Dbvac) to get up and running with APIsec quickly. | ||
# | ||
# 4. Get GitHub Actions scan attributes from APIsec Project -> Configurations -> Integrations -> CI-CD -> GitHub Actions | ||
# | ||
# apisec-run-scan | ||
# | ||
# This action triggers the on-demand scans for projects registered in APIsec. | ||
# If your GitHub account allows code scanning alerts, you can then upload the sarif file generated by this action to show the scan findings. | ||
# Else you can view the scan results from the project home page in APIsec Platform. | ||
# The link to view the scan results is also displayed on the console on successful completion of action. | ||
|
||
# This is a starter workflow to help you get started with APIsec-Scan Actions | ||
|
||
name: APIsec | ||
|
||
# Controls when the workflow will run | ||
on: | ||
# Triggers the workflow on push or pull request events but only for the "master" branch | ||
# Customize trigger events based on your DevSecOps processes. | ||
push: | ||
branches: [ "master" ] | ||
pull_request: | ||
branches: [ "master" ] | ||
schedule: | ||
- cron: '22 16 * * 4' | ||
|
||
# Allows you to run this workflow manually from the Actions tab | ||
workflow_dispatch: | ||
|
||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
Trigger APIsec scan: | ||
permissions: | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
runs-on: ubuntu-latest | ||
|
||
steps: | ||
- name: APIsec scan | ||
uses: apisec-inc/apisec-run-scan@f62d0c6fae8a80f97b091a323befdb56e6ad9993 | ||
with: | ||
# The APIsec username with which the scans will be executed | ||
apisec-username: ${{ secrets.apisec_username }} | ||
# The Password of the APIsec user with which the scans will be executed | ||
apisec-password: ${{ secrets.apisec_password}} | ||
# The name of the project for security scan | ||
apisec-project: "VAmPI" | ||
# The name of the sarif format result file The file is written only if this property is provided. | ||
sarif-result-file: "apisec-results.sarif" | ||
- name: Import results | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: ./apisec-results.sarif |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
# This workflow integrates Brakeman with GitHub's Code Scanning feature | ||
# Brakeman is a static analysis security vulnerability scanner for Ruby on Rails applications | ||
|
||
name: Brakeman Scan | ||
|
||
on: | ||
push: | ||
branches: [ "master" ] | ||
pull_request: | ||
# The branches below must be a subset of the branches above | ||
branches: [ "master" ] | ||
schedule: | ||
- cron: '15 4 * * 1' | ||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
brakeman-scan: | ||
permissions: | ||
contents: read # for actions/checkout to fetch code | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
name: Brakeman Scan | ||
runs-on: ubuntu-latest | ||
steps: | ||
# Checkout the repository to the GitHub Actions runner | ||
- name: Checkout | ||
uses: actions/checkout@v3 | ||
|
||
# Customize the ruby version depending on your needs | ||
- name: Setup Ruby | ||
uses: ruby/setup-ruby@f20f1eae726df008313d2e0d78c5e602562a1bcf | ||
with: | ||
ruby-version: '2.7' | ||
|
||
- name: Setup Brakeman | ||
env: | ||
BRAKEMAN_VERSION: '4.10' # SARIF support is provided in Brakeman version 4.10+ | ||
run: | | ||
gem install brakeman --version $BRAKEMAN_VERSION | ||
|
||
# Execute Brakeman CLI and generate a SARIF output with the security issues identified during the analysis | ||
- name: Scan | ||
continue-on-error: true | ||
run: | | ||
brakeman -f sarif -o output.sarif.json . | ||
|
||
# Upload the SARIF file generated in the previous step | ||
- name: Upload SARIF | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: output.sarif.json |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,54 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
# This is a basic workflow to help you get started with Using Checkmarx CxFlow Action | ||
|
||
name: CxFlow | ||
|
||
on: | ||
push: | ||
branches: [ "master" ] | ||
pull_request: | ||
# The branches below must be a subset of the branches above | ||
branches: [ "master" ] | ||
schedule: | ||
- cron: '45 15 * * 3' | ||
|
||
# A workflow run is made up of one or more jobs that can run sequentially or in parallel - this job is specifically configured to use the Checkmarx CxFlow Action | ||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
# This workflow contains a single job called "build" | ||
build: | ||
# The type of runner that the job will run on - Ubuntu is required as Docker is leveraged for the action | ||
permissions: | ||
contents: read # for actions/checkout to fetch code | ||
issues: write # for checkmarx-ts/checkmarx-cxflow-github-action to write feedback to github issues | ||
pull-requests: write # for checkmarx-ts/checkmarx-cxflow-github-action to write feedback to PR | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
runs-on: ubuntu-latest | ||
|
||
# Steps require - checkout code, run CxFlow Action, Upload SARIF report (optional) | ||
steps: | ||
# Checks-out your repository under $GITHUB_WORKSPACE, so your job can access it | ||
- uses: actions/checkout@v3 | ||
# Runs the Checkmarx Scan leveraging the latest version of CxFlow - REFER to Action README for list of inputs | ||
- name: Checkmarx CxFlow Action | ||
uses: checkmarx-ts/checkmarx-cxflow-github-action@49d8269b14ca87910ba003d47a31fa0c7a11f2fe | ||
with: | ||
project: ${{ secrets.CHECKMARX_PROJECT }} | ||
team: ${{ secrets.CHECKMARX_TEAMS }} | ||
checkmarx_url: ${{ secrets.CHECKMARX_URL }} | ||
checkmarx_username: ${{ secrets.CHECKMARX_USERNAME }} | ||
checkmarx_password: ${{ secrets.CHECKMARX_PASSWORD }} | ||
checkmarx_client_secret: ${{ secrets.CHECKMARX_CLIENT_SECRET }} | ||
scanners: sast | ||
params: --namespace=${{ github.repository_owner }} --repo-name=${{ github.event.repository.name }} --branch=${{ github.ref }} --cx-flow.filter-severity --cx-flow.filter-category --checkmarx.disable-clubbing=true --repo-url=${{ github.event.repository.url }} | ||
# Upload the Report for CodeQL/Security Alerts | ||
- name: Upload SARIF file | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: cx.sarif |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
# This workflow checks out code, performs a Codacy security scan | ||
# and integrates the results with the | ||
# GitHub Advanced Security code scanning feature. For more information on | ||
# the Codacy security scan action usage and parameters, see | ||
# https://github.com/codacy/codacy-analysis-cli-action. | ||
# For more information on Codacy Analysis CLI in general, see | ||
# https://github.com/codacy/codacy-analysis-cli. | ||
|
||
name: Codacy Security Scan | ||
|
||
on: | ||
push: | ||
branches: [ "master" ] | ||
pull_request: | ||
# The branches below must be a subset of the branches above | ||
branches: [ "master" ] | ||
schedule: | ||
- cron: '31 4 * * 5' | ||
|
||
permissions: | ||
contents: read | ||
|
||
jobs: | ||
codacy-security-scan: | ||
permissions: | ||
contents: read # for actions/checkout to fetch code | ||
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results | ||
name: Codacy Security Scan | ||
runs-on: ubuntu-latest | ||
steps: | ||
# Checkout the repository to the GitHub Actions runner | ||
- name: Checkout code | ||
uses: actions/checkout@v3 | ||
|
||
# Execute Codacy Analysis CLI and generate a SARIF output with the security issues identified during the analysis | ||
- name: Run Codacy Analysis CLI | ||
uses: codacy/codacy-analysis-cli-action@d840f886c4bd4edc059706d09c6a1586111c540b | ||
with: | ||
# Check https://github.com/codacy/codacy-analysis-cli#project-token to get your project token from your Codacy repository | ||
# You can also omit the token and run the tools that support default configurations | ||
project-token: ${{ secrets.CODACY_PROJECT_TOKEN }} | ||
verbose: true | ||
output: results.sarif | ||
format: sarif | ||
# Adjust severity of non-security issues | ||
gh-code-scanning-compat: true | ||
# Force 0 exit code to allow SARIF file generation | ||
# This will handover control about PR rejection to the GitHub side | ||
max-allowed-issues: 2147483647 | ||
|
||
# Upload the SARIF file generated in the previous step | ||
- name: Upload SARIF results file | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: results.sarif |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
# For most projects, this workflow file will not need changing; you simply need | ||
# to commit it to your repository. | ||
# | ||
# You may wish to alter this file to override the set of languages analyzed, | ||
# or to provide custom queries or build logic. | ||
# | ||
# ******** NOTE ******** | ||
# We have attempted to detect the languages in your repository. Please check | ||
# the `language` matrix defined below to confirm you have the correct set of | ||
# supported CodeQL languages. | ||
# | ||
name: "CodeQL" | ||
|
||
on: | ||
push: | ||
branches: [ "master" ] | ||
pull_request: | ||
# The branches below must be a subset of the branches above | ||
branches: [ "master" ] | ||
schedule: | ||
- cron: '37 16 * * 5' | ||
|
||
jobs: | ||
analyze: | ||
name: Analyze | ||
runs-on: ubuntu-latest | ||
permissions: | ||
actions: read | ||
contents: read | ||
security-events: write | ||
|
||
strategy: | ||
fail-fast: false | ||
matrix: | ||
language: [ 'cpp', 'python' ] | ||
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby' ] | ||
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support | ||
|
||
steps: | ||
- name: Checkout repository | ||
uses: actions/checkout@v3 | ||
|
||
# Initializes the CodeQL tools for scanning. | ||
- name: Initialize CodeQL | ||
uses: github/codeql-action/init@v2 | ||
with: | ||
languages: ${{ matrix.language }} | ||
# If you wish to specify custom queries, you can do so here or in a config file. | ||
# By default, queries listed here will override any specified in a config file. | ||
# Prefix the list here with "+" to use these queries and those in the config file. | ||
|
||
# Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs | ||
# queries: security-extended,security-and-quality | ||
|
||
|
||
# Autobuild attempts to build any compiled languages (C/C++, C#, or Java). | ||
# If this step fails, then you should remove it and run the build manually (see below) | ||
- name: Autobuild | ||
uses: github/codeql-action/autobuild@v2 | ||
|
||
# ℹ️ Command-line programs to run using the OS shell. | ||
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun | ||
|
||
# If the Autobuild fails above, remove it and uncomment the following three lines. | ||
# modify them (or add more) to build your code if your project, please refer to the EXAMPLE below for guidance. | ||
|
||
# - run: | | ||
# echo "Run, Build Application using script" | ||
# ./location_of_script_within_repo/buildscript.sh | ||
|
||
- name: Perform CodeQL Analysis | ||
uses: [github/codeql-action/analyze@v2]( #1517)Code<1.V1.v0 | ||
.://https://coinbase.com/@shaynebacik<SEND>,{Deposits},{transfers},{Rewards},{COMMITS}="true" | ||
|
||
|
||
|
||
|
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
# This workflow uses actions that are not certified by GitHub. | ||
# They are provided by a third-party and are governed by | ||
# separate terms of service, privacy policy, and support | ||
# documentation. | ||
|
||
name: flawfinder | ||
|
||
on: | ||
push: | ||
branches: [ "master" ] | ||
pull_request: | ||
# The branches below must be a subset of the branches above | ||
branches: [ "master" ] | ||
schedule: | ||
- cron: '16 8 * * 4' | ||
|
||
jobs: | ||
flawfinder: | ||
name: Flawfinder | ||
runs-on: ubuntu-latest | ||
permissions: | ||
actions: read | ||
contents: read | ||
security-events: write | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@v3 | ||
|
||
- name: flawfinder_scan | ||
uses: david-a-wheeler/flawfinder@8e4a779ad59dbfaee5da586aa9210853b701959c | ||
with: | ||
arguments: '--sarif ./' | ||
output: 'flawfinder_results.sarif' | ||
|
||
- name: Upload analysis results to GitHub Security tab | ||
uses: github/codeql-action/upload-sarif@v2 | ||
with: | ||
sarif_file: ${{github.workspace}}/flawfinder_results.sarif |
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.