-
Notifications
You must be signed in to change notification settings - Fork 558
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability Management #1706
Vulnerability Management #1706
Conversation
Configure WhiteSource Bolt for GitHub
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
hey @4k4xs4pH1r3 thanks for proposing these checks! would you please confirm that you intend to sign the CLA? unfortunately we're unable to accept contributions without the CLA. also, can you show us any examples of the output? i've heard of many of these tools and am interested to see the sorts of things they'll bring to capa. |
@williballenthin Yes, I already signed the CLA. The objective of this pull request is this= #1706 (comment) And the output will notify You about fixes here https://github.com/notifications; this is the implementation of the below= 1. Security (Standard: Robust Security Measures) Implement robust AutoDevSecOps security measures throughout the Software Development Life Cycle (SDLC) to protect the integrity and confidentiality of the code and data to be under compliance with Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), Runtime Application Self-Protection (RASP), Infrastructure as Code (IaC) Scanning, Breach and Attack Simulation (BAS), Dependency Scanning, Container Scanning, Secret Detection, Coverage Fuzzing, API Fuzzing, Cluster Image Scanning security tests and other future SDLC solutions that help to protect the pipelines. 2. Compliance (Standard: Adherence to Industry Regulations and Standards) Adhere to industry regulations and standards related to data security, privacy, and any other applicable compliance requirements. Like this= |
Bumps [types-pyyaml](https://github.com/python/typeshed) from 6.0.8 to 6.0.12.11. - [Commits](https://github.com/python/typeshed/commits) --- updated-dependencies: - dependency-name: types-pyyaml dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
Bumps [types-protobuf](https://github.com/python/typeshed) from 4.23.0.3 to 4.24.0.1. - [Commits](https://github.com/python/typeshed/commits) --- updated-dependencies: - dependency-name: types-protobuf dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
Use this section to tell people about which versions of your project are | ||
currently being supported with security updates. | ||
|
||
| Version | Supported | | ||
| ------- | ------------------ | | ||
| 5.1.x | :white_check_mark: | | ||
| 5.0.x | :x: | | ||
| 4.0.x | :white_check_mark: | | ||
| < 4.0 | :x: | | ||
|
||
## Reporting a Vulnerability | ||
|
||
Use this section to tell people how to report a vulnerability. | ||
|
||
Tell them where to go, how often they can expect to get an update on a | ||
reported vulnerability, what to expect if the vulnerability is accepted or | ||
declined, etc. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@williballenthin TODO
this is neat @4k4xs4pH1r3 I would like to enable these scans. i've added a few comments inline. let me know if you're able to address them; otherwise, we can take a stab as we have time. thanks! |
Bumps [isort](https://github.com/pycqa/isort) from 5.11.4 to 5.12.0. - [Release notes](https://github.com/pycqa/isort/releases) - [Changelog](https://github.com/PyCQA/isort/blob/main/CHANGELOG.md) - [Commits](PyCQA/isort@5.11.4...5.12.0) --- updated-dependencies: - dependency-name: isort dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <support@github.com>
build(deps-dev): bump isort from 5.11.4 to 5.12.0
….0.12.11 build(deps-dev): bump types-pyyaml from 6.0.8 to 6.0.12.11
…-4.24.0.1 build(deps-dev): bump types-protobuf from 4.23.0.3 to 4.24.0.1
Bumps [types-colorama](https://github.com/python/typeshed) from 0.4.15.11 to 0.4.15.12. - [Commits](https://github.com/python/typeshed/commits) --- updated-dependencies: - dependency-name: types-colorama dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Signed-off-by: ҉αkα x⠠⠵ <32862241+4k4xs4pH1r3@users.noreply.github.com>
Hello, @williballenthin and @mr-tz, I made some improvements, and based on them please can You help to see this PR again, after your revision with the current Missing CLA, is probable that this PR will require more future refinements on my side, thank you. |
hi @4k4xs4pH1r3 Thanks for your continued work on this PR. At this time I'm not comfortable with the changes. There are too many new checks added. This is a problem for a few reasons:
That being said, there are still some useful nuggets in here. If you would prune the PR to a handful of key changes then I'd be willing to consider those. |
Closing this to prevent new (and maybe cancel existing) Checks workflow runs. |
[x] No CHANGELOG update needed
Vulnerability management is a risk-based approach to discovering, prioritizing, and remediating vulnerabilities and misconfiguration.
This pull request is project to maintain the compliance with:
Orchestrate Vulnerability code scanning
Apply security best practices with GitHub Actions Security
Please look at the commits to view each file's details and their objectives.