Fully open-source GitHub Action for performing security audits on project dependencies using dep-scan, based on known vulnerabilities and advisories. No server required!
This project is a fork of AppThreat/dep-scan-action
- Anyone can run the software licensed under GPLv3 for any purpose without restrictions.
- GPLv3 ensures that users have access to the software's source code, allowing them to study, modify, and improve it.
- Users can distribute copies of the software, but they must do so under the terms of GPLv3. This ensures that the original freedoms are maintained in new versions.
- If someone modifies the software and distributes it, they must do so under the same GPLv3 terms and provide the source code for their modifications as well.
- If you are interested in knowing more details about the license, please visit the following links:
-
src:
- Description: The source directory to scan. If not specified, it defaults to the workspace directory (
/github/workspace
). - Required: No
- Default:
/github/workspace
- Description: The source directory to scan. If not specified, it defaults to the workspace directory (
-
profile:
- Description: The name of the profile to use for the scan. Available options include
appsec
,research
,operational
,threat-modeling
,license-compliance
, andgeneric
. - Required: No
- Default:
generic
- Description: The name of the profile to use for the scan. Available options include
-
project_type:
- Description: Override the project type if the automatic detection is incorrect. Refer to the dep-scan documentation for supported languages and package formats.
- Required: No
-
thank_you:
- Description: A field to indicate whether you have sponsored OWASP dep-scan.
- Required: No
- Default:
I have not sponsored OWASP-dep-scan.
-
Add the Action to Your Workflow:
Include thedep-scan-action
in your GitHub Actions workflow YAML file. Here’s an example:jobs: security-audit: runs-on: ubuntu-latest steps: - name: Checkout code uses: actions/checkout@v2 - name: Run dep-scan-action uses: cob0/dep-scan-action@master with: src: 'path/to/your/source' profile: 'appsec' project_type: 'nodejs' env: VDB_HOME: ${{ github.workspace }}/db GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} - name: Upload report to build artifacts uses: actions/upload-artifact@v2 with: name: dep-scan-report path: path/to/report/directory/*
-
Configure Inputs:
Specify the inputs as needed. You can customize the
src
,profile
, andproject_type
based on your project requirements. If you do not provide a value for an input, the action will use the default value. -
Review the Results:
After the action runs, review the output logs to see the results of the security audit. The action will provide insights into any vulnerabilities found in your dependencies.
-
Upload Reports:
The last step in the example uploads the generated reports as artifacts. Make sure to replace
path/to/report/directory/*
with the actual path where the reports are generated by thedep-scan-action
.