Skip to content

Commit

Permalink
fix images path in all PR
Browse files Browse the repository at this point in the history
  • Loading branch information
mdominguez56 committed Mar 26, 2024
1 parent 3490f69 commit b0e11e4
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 13 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -50,8 +50,8 @@ SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }}
By integrating this `yml` file to our project, it will cause the following actions to be executed in our project:

![Snyk CI/CD](examples/security-assessments-guide/assets/snyk-cicd-example.png)
![Snyk CI/CD vulnerabilities](examples/security-assessments-guide/assets/snyk-cicd-check-vulnerabilites.png)
![Snyk CI/CD](../assets/snyk-cicd-example.png)
![Snyk CI/CD vulnerabilities](../assets/snyk-cicd-check-vulnerabilites.png)

Note that this example was executed on a React app created with Vite.

Expand Down Expand Up @@ -160,7 +160,7 @@ jobs:
sarif_file: snyk.sarif
```

![Snyk GitHub Code Scanning](examples/security-assessments-guide/assets/snyk-github.jpeg)
![Snyk GitHub Code Scanning](../assets/snyk-github.jpeg)

## Gitlab

Expand Down Expand Up @@ -196,11 +196,11 @@ Add a GitLab Personal Access Token in GitLab
Select the profile icon, then Edit Profile > Access Tokens.
Set the token name, for example, Snyk, and select the api scope.

![Gitlab-integration-1](examples/security-assessments-guide/assets/gitlab-integration-1.png)
![Gitlab-integration-1](../assets/gitlab-integration-1.png)

2. Navigate to the Snyk [Integrations](https://app.snyk.io/integrations?_gl=1*117zdop*_ga*MTE0NDg5NDA5MC4xNzA2MDAyOTQ2*_ga_X9SH3KP7B4*MTcwODYyMjI2NC4zLjEuMTcwODYyMzIzNC4wLjAuMA..) page, select the GitLab integration tile, and enter the URL of the GitLab instance and the token you generated.

Check failure on line 201 in examples/security-assessments-guide/continous-integration-workflow/README.md

View workflow job for this annotation

GitHub Actions / Markdownlint / Markdown Lint

Ordered list item prefix [Expected: 1; Actual: 2; Style: 1/1/1]

![Gitlab-integration-2](examples/security-assessments-guide/assets/gitlab-integration-2.png)
![Gitlab-integration-2](../assets/gitlab-integration-2.png)

3. Click Save.

Check failure on line 205 in examples/security-assessments-guide/continous-integration-workflow/README.md

View workflow job for this annotation

GitHub Actions / Markdownlint / Markdown Lint

Ordered list item prefix [Expected: 1; Actual: 3; Style: 1/2/3]

Expand Down Expand Up @@ -251,7 +251,7 @@ As of the date of this documentation (February 2024), Snyk integration is curren

Check if your project must be built before the scan in the CodePipeline. If the project needs to be built, you must add a CodeBuild step before the Snyk Step.

![aws-codepipeline-1](examples/security-assessments-guide/assets/aws-codepipeline-1.png)
![aws-codepipeline-1](../assets/aws-codepipeline-1.png)

### AWS CodePipeline CodeBuild step example

Expand All @@ -276,12 +276,12 @@ Warning: Snyk integration with CodePipeline requires a UI based authentication s
At any point after the Source stage, you can add a Snyk scan stage, allowing you to test your application at different stages of the CI/CD pipeline.
Click Edit, and Add a Scan Stage.

![aws-codepipeline-step1](examples/security-assessments-guide/assets/aws-codepipeline-2.png)
![aws-codepipeline-step1](../assets/aws-codepipeline-2.png)

2. Add action group
Click Add an Action Group to open the Edit Action window:

![aws-codepipeline-step2](examples/security-assessments-guide/assets/aws-codepipeline-3.png)
![aws-codepipeline-step2](../assets/aws-codepipeline-3.png)

Name the action, then select Snyk as the Action Provider.

Expand All @@ -290,12 +290,12 @@ Click Connect with Snyk to begin the connection process.
3. Connect to Snyk
Select how you would like to authenticate with Snyk to give AWS CodePipeline permission to begin scanning your open-source code.

![aws-codepipeline-step3](examples/security-assessments-guide/assets/aws-codepipeline-4.png)
![aws-codepipeline-step3](../assets/aws-codepipeline-4.png)

4. Configure settings
The following options are available for configuration:

![aws-codepipeline-step4](examples/security-assessments-guide/assets/aws-codepipeline-5.png)
![aws-codepipeline-step4](../assets/aws-codepipeline-5.png)

- Snyk organization: Select the Snyk organization where reports of findings are saved.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ Follow the steps below to install Snyk in Visual Studio Code:

Example of how you will see snyk in Visual Studio Code:

![Snyk VsCode Extension](examples/security-assessments-guide/assets/snyk-vscode.png)
![Snyk VsCode Extension](../assets/snyk-vscode.png)

Once you have installed the extension and made the required configurations, you can scan the repository you are working on. The analyses you can perform include:

Expand All @@ -41,7 +41,7 @@ Once you have installed the extension and made the required configurations, you

All the above mentioned scans will give results according to the level of criticality, which may have different severities:

![Severity in Snyk](examples/security-assessments-guide/assets/severity-snyk.png)
![Severity in Snyk](../assets/severity-snyk.png)

If you want to learn more about analyzing the results obtained, you can check this [link](https://docs.snyk.io/integrate-with-snyk/ide-tools/visual-studio-code-extension/view-analysis-results-from-visual-studio-code-extension).

Expand All @@ -59,7 +59,7 @@ Trivy performs a scan on your entire code, providing results aimed at preventing

Here's how you'll see the results obtained in each scan:

![Trivy scan](examples/security-assessments-guide/assets/trivy.png)
![Trivy scan](../assets/trivy.png)

## JetBrains

Expand Down

0 comments on commit b0e11e4

Please sign in to comment.