Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

GitHub Action for adding contextual training material to SARIF files

License

NotificationsYou must be signed in to change notification settings

SecureCodeWarrior/github-action-add-sarif-contextual-training

Use this GitHub action with your project
Add this Action to an existing workflow or create a new one
View on Marketplace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

89 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

This GitHub Action adds Secure Code Warrior contextual application security training material to SARIF files. This training material will be displayed within Code Scanning alerts if the resulting SARIF file is imported using thegithub/codeql-action/upload-sarif Action, and includes links to secure coding exercises and short explainer videos where available.

This Action currently supports adding training material based on CWE references (e.g. CWE 89) and common vulnerability phrases (e.g. use-after-free vulnerability) included in static analysis findings.

Usage

Individual SARIF file

steps:# Fetch SARIF - for example:# - Checkout the repository using `actions/checkout` if the SARIF file is committed. This example assumes the SARIF file is located at `sarif/findings.sarif` within the repository.#     - name: Checkout repository#       uses: actions/checkout@v2# - Fetch the SARIF file from your SAST tool. The vendor may already have a GitHub Action for this. This example assumes the SARIF file is fetched and saved to `sarif/findings.sarif`.#     - name: Download SARIF#       uses: vendor/sast-tool-sarif@v1#       with:#         user: ${{ secrets.USER }}#         key: ${{ secrets.KEY }}#         scan-id: ${{ secrets.SCAN_ID }}#         output-file: sarif/findings.sarif# - Convert a SAST tool report into SARIF. The vendor may already have a GitHub Action or script for this. This example assumes the converted SARIF file is located at `sarif/findings.sarif`.#     - name: Convert report to SARIF#       uses: vendor/sast-tool-sarif-converter@v1#       with:#         report-file: reports/sast-scan.xml#         output-file: sarif/findings.sarif      -name:Add SCW Traininguses:SecureCodeWarrior/github-action-add-sarif-contextual-training@v1with:inputSarifFile:sarif/findings.sarifoutputSarifFile:sarif/findings.processed.sarifgithubToken:${{ secrets.GITHUB_TOKEN }}      -name:Import Resultsuses:github/codeql-action/upload-sarif@v3with:sarif_file:sarif/findings.processed.sarif

Multiple SARIF files using glob path

steps:# Fetch SARIF - see additional examples above      -name:Download SARIFuses:vendor/sast-tool-sarif@v1with:user:${{ secrets.USER }}key:${{ secrets.KEY }}scan-id:${{ secrets.SCAN_ID }}output-dir:./sarifs# in this example we assume the tool outputs multiple SARIF files as .json files      -name:Add SCW Traininguses:SecureCodeWarrior/github-action-add-sarif-contextual-training@v1with:inputSarifFile:./sarifs/*.jsonoutputSarifFile:./processed-sarifsgithubToken:${{ secrets.GITHUB_TOKEN }}      -name:Import Resultsuses:github/codeql-action/upload-sarif@v3with:sarif_file:./processed-sarifs

Multiple SARIF files in directory

steps:# Fetch SARIF - see additional examples above      -name:Download SARIFuses:vendor/sast-tool-sarif@v1with:user:${{ secrets.USER }}key:${{ secrets.KEY }}scan-id:${{ secrets.SCAN_ID }}output-dir:./sarifs# in this example we assume the tool outputs multiple SARIF files in nested directories within the specified output directory      -name:Add SCW Traininguses:SecureCodeWarrior/github-action-add-sarif-contextual-training@v1with:inputSarifFile:./sarifsoutputSarifFile:./processed-sarifsgithubToken:${{ secrets.GITHUB_TOKEN }}      -name:Import Resultsuses:github/codeql-action/upload-sarif@v3with:sarif_file:./processed-sarifs

Inputs

inputSarifFile

The SARIF file(s) to add Secure Code Warrior contextual training material to. This can be a path to a single file (e.g../findings.sarif), a glob path (e.g../scans/**/*.sarif) or a directory (d.g../scans), in which case all.sarif files recursively in the specified directory will be processed.Default value:./findings.sarif

outputSarifFile

The output path of the resulting SARIF file(s) with Secure Code Warrior contextual training material appended. If a glob path or a directory was provided as theinputSarifFile input then the resulting SARIF files will be output to the./processed-sarifs directory, which can then simply be the path provided in thesarif_file input of thegithub/codeql-action/upload-sarif action.Default value:./findings.processed.sarif

githubToken (optional)

Provide${{ secrets.GITHUB_TOKEN }} to use the GitHub access token automatically supplied by GitHub Workflows. This enables language-specific training links to be generated (where available) by fetching the repository language from the GitHub API.

About

GitHub Action for adding contextual training material to SARIF files

Resources

License

Stars

Watchers

Forks

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp