Skip to content

Contrast-Security-OSS/contrast-sca-action

Use this GitHub action with your project
Add this Action to an existing workflow or create a new one
View on Marketplace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Use Contrast Security SCA to find your vulnerable dependencies

This GitHub action lets you use Contrast Security to detect vulnerable dependencies in your code. The action looks at project configuration files, identifies vulnerable dependencies and provides guidance on the versions to update.

Initial steps for using the action

If you are not familiar with GitHub actions read the GitHub Actions documentation to learn what GitHub Actions are and how to set them up. After which, complete the following steps:

  1. Configure the following GitHub secrets CONTRAST_API_KEY, CONTRAST_ORGANIZATION_ID, CONTRAST_AUTH_HEADER and CONTRAST_API_URL

    image
  • CodeSec by Contrast Security users: Retrieve authentication details for the secrets using the CLI.

  • Licensed Contrast Security users: Get your authentication details for the secrets from the 'User Settings' menu in the Contrast web interface: You will need the following

    • Organization ID

    • Your API key

    • Authorization header

    • You will also need the URL of your Contrast UI host. This input includes the protocol section of the URL (https://).

      image
  1. Copy one of the sample workflows below and create a branch of your code to add Contrast Security SCA. This branch is typically located at .github/workflows/build.yml

  2. Update the workflow file to specify when the action should run (for example on pull_request, on push)

    on:
      pull_request:
        branches:
          - "main"
  3. Update the filepath in the workflow file to specfy the location of the project configuration file where dependencies are declared

              filePath: package.json
  4. To fail based on severity of CVEs found set severity (critical/high/medium or low) and fail to true

              severity: medium
              fail: true
  5. After committing, create a Pull Request (PR) to merge the update back to your main branch. Creating the PR triggers the Contrast Security SCA action to run.

Usage

The following are sample workflows to get started in Java, Node, PHP.

Java

name: Contrast Security SCA
on:
  push:
    branches:
      - "main"
jobs:
  Check-Dependency-Vulnerabilities:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v3

      - name: Set up JDK 11
        uses: actions/setup-java@v3
        with:
          java-version: '11'
          distribution: 'adopt'

      - name: build jar
        run: |
          mvn clean install -DskipTests

      - name: Contrast SCA Action
        uses: Contrast-Security-OSS/contrast-sca-action@v1
        with:
          apiKey: ${{ secrets.CONTRAST_API_KEY }}
          orgId: ${{ secrets.CONTRAST_ORGANIZATION_ID }}
          authHeader: ${{ secrets.CONTRAST_AUTH_HEADER }}
          apiUrl: ${{ secrets.CONTRAST_API_URL }}
          filePath: mypath/to/config/files
          severity: medium
          fail: true

Node

name: Contrast Security SCA

on:
  pull_request:
    branches:
      - "main"

jobs:
  Check-Dependency-Vulnerabilities:
    runs-on: ubuntu-latest
    steps:
        # Checkout/build your application/install Node
      - uses: actions/checkout@v3

      - name: Contrast SCA Action
        uses: Contrast-Security-OSS/contrast-sca-action@v1
        with:
          apiKey: ${{ secrets.CONTRAST_API_KEY }}
          orgId: ${{ secrets.CONTRAST_ORGANIZATION_ID }}
          authHeader: ${{ secrets.CONTRAST_AUTH_HEADER }}
          apiUrl: ${{ secrets.CONTRAST_API_URL }}
          filePath: mypath/to/config/files
          severity: medium
          fail: true

PHP

name: Contrast Security SCA

on:
  push:
    branches:
      - "main"

jobs:
  Check-Dependency-Vulnerabilities:
    runs-on: ubuntu-latest
    steps:
        # Check out/build your application
      - uses: actions/checkout@v3

        # Install composer
      - uses: php-actions/composer@v6

      - name: Contrast SCA Action
        uses: Contrast-Security-OSS/contrast-sca-action@v1
        with:
          apiKey: ${{ secrets.CONTRAST_API_KEY }}
          orgId: ${{ secrets.CONTRAST_ORGANIZATION_ID }}
          authHeader: ${{ secrets.CONTRAST_AUTH_HEADER }}
          apiUrl: ${{ secrets.CONTRAST_API_URL }}
          filePath: mypath/to/config/files
          severity: medium
          fail: true
  • Supported languages and their requirements:
    • Java: pom.xml and Maven build platform including the dependency plugin
      or build.gradle and gradle dependencies or ./gradlew dependencies must be
      supported
    • .NET core: MSBuild 15.0 or greater and a
      packages.lock.json file.
      Note: If the packages.lock.json file is unavailable it can be generated by
      setting RestorePackagesWithLockFile to true within each *.csproj file and
      running dotnet build.
    • Node: package.json and a lock file (either .package-lock.json or .yarn.lock.)
    • Ruby: gemfile and gemfile.lock
    • Python: pipfile and pipfile.lock
    • Go: go.mod
    • PHP: composer.json and composer.lock

All Contrast Security related account secrets should be configured as GitHub secrets and will be passed via environment variables in the GitHub runner.

This section details the various inputs you can use with this Contrast Security GitHub Action. Inputs marked as "required" must be provided for the action to function correctly.

Inputs

Required Inputs

  • apiKey: An agent API key provided by Contrast (required).
  • authHeader: User authorization credentials provided by Contrast (required).
  • orgId: The ID of your organization in Contrast (required).
  • filePath: Specify the directory in which to search for project configuration files (required).

Command Input

  • command: Command to run cli with audit/fingerprint/sarif (optional, defaults to "audit")

Optional Inputs

  • repositoryId: The ID of your repo. (optional)
  • projectGroupId: The ID of your project Groups. (optional)
  • applicationId: The ID of your application. (optional)
  • apiUrl: The name of the host. Includes the protocol section of the URL (https://). Defaults to https://ce.contrastsecurity.com. (optional, defaults to "https://ce.contrastsecurity.com")
  • severity: Allows user to report libraries with vulnerabilities above a chosen severity level. Values for level are high, medium or low. (Note: Use this input in combination with the fail input, otherwise the action will exit) (optional, defaults to "CRITICAL")  
  • fail: When set to true, fails the action if CVEs have been detected that match at least the severity option specified. (optional)
  • ignoreDev: When set to true, excludes developer dependencies from the results. (optional)
  • outputSummary: Defaults to true. When set to true, writes the output of the audit to the GitHub Actions Summary. (optional, defaults to "true")
  • repoUrl: When set, will pass the optional repo url parameter to the contrast cli (optional)
  • repoName: When set, will pass the optional repo name parameter to the contrast cli (optional)
  • externalId: When set, will pass the optional external id parameter to the contrast cli (optional)
  • auditTimeout: Sets the timeout for an audit in seconds, Default: 600 (10 minutes) (optional, defaults to "600")
  • metadata: Metadata filter to be passed to the Contrast CLI when running sarif command (optional)
  • ghasEnabled: When set to true, will upload sarif to the GHAS integration (optional, defaults to "true")
  • legacy: When set to true, uses the legacy audit command. (optional)
  • modifier: When set this will be added as a suffix to the output file names for logs and sboms uploaded to the summary page. (optional, defaults to a random string)