mirror of
https://github.com/actions/download-artifact.git
synced 2024-12-22 22:32:43 +00:00
Create stackhawk-analysis.yml
This commit is contained in:
parent
c1c7b2ed58
commit
251abf5fab
1 changed files with 57 additions and 0 deletions
57
.github/workflows/stackhawk-analysis.yml
vendored
Normal file
57
.github/workflows/stackhawk-analysis.yml
vendored
Normal file
|
@ -0,0 +1,57 @@
|
|||
# This workflow uses actions that are not certified by GitHub.
|
||||
# They are provided by a third-party and are governed by
|
||||
# separate terms of service, privacy policy, and support
|
||||
# documentation.
|
||||
|
||||
# 🦅 STACKHAWK https://stackhawk.com
|
||||
|
||||
# The StackHawk HawkScan action makes it easy to integrate dynamic application security testing (DAST) into your
|
||||
# CI pipeline. See the Getting Started guide (https://docs.stackhawk.com/hawkscan/) to get up and running with
|
||||
# StackHawk quickly.
|
||||
|
||||
# To use this workflow, you must:
|
||||
#
|
||||
# 1. Create an API Key and Application: Sign up for a free StackHawk account to obtain an API Key and
|
||||
# create your first app and configuration file at https://app.stackhawk.com.
|
||||
#
|
||||
# 2. Save your API Key as a Secret: Save your API key as a GitHub Secret named HAWK_API_KEY.
|
||||
#
|
||||
# 3. Add your Config File: Add your stackhawk.yml configuration file to the base of your repository directory.
|
||||
#
|
||||
# 4. Set the Scan Failure Threshold: Add the hawk.failureThreshold configuration option
|
||||
# (https://docs.stackhawk.com/hawkscan/configuration/#hawk) to your stackhawk.yml configuration file. If your scan
|
||||
# produces alerts that meet or exceed the hawk.failureThreshold alert level, the scan will return exit code 42
|
||||
# and trigger a Code Scanning alert with a link to your scan results.
|
||||
#
|
||||
# 5. Update the "Start your service" Step: Update the "Start your service" step in the StackHawk workflow below to
|
||||
# start your service so that it can be scanned with the "Run HawkScan" step.
|
||||
|
||||
|
||||
name: "StackHawk"
|
||||
|
||||
on:
|
||||
push:
|
||||
branches: [ main ]
|
||||
pull_request:
|
||||
branches: [ main ]
|
||||
schedule:
|
||||
- cron: '43 9 * * 3'
|
||||
|
||||
jobs:
|
||||
stackhawk:
|
||||
name: StackHawk
|
||||
runs-on: ubuntu-20.04
|
||||
steps:
|
||||
- name: Checkout code
|
||||
uses: actions/checkout@v2
|
||||
|
||||
- name: Start your service
|
||||
run: ./your-service.sh & # ✏️ Update this to run your own service to be scanned
|
||||
|
||||
- name: Run HawkScan
|
||||
uses: stackhawk/hawkscan-action@4c3258cd62248dac6d9fe91dd8d45928c697dee0
|
||||
continue-on-error: true # ✏️ Set to false to break your build on scan errors
|
||||
with:
|
||||
apiKey: ${{ secrets.HAWK_API_KEY }}
|
||||
codeScanningAlerts: true
|
||||
githubToken: ${{ github.token }}
|
Loading…
Reference in a new issue