This GitHub action lets you use Contrast Security to detect vulnerable dependencies in your code. The action looks at project configuration files, identifies vulnerable dependencies and provides guidance on the versions to update.
If you are not familiar with GitHub actions read the GitHub Actions documentation to learn what GitHub Actions are and how to set them up. After which, complete the following steps:
-
Configure the following GitHub secrets CONTRAST_API_KEY, CONTRAST_ORGANIZATION_ID, CONTRAST_AUTH_HEADER and CONTRAST_API_URL
-
CodeSec by Contrast Security users: Retrieve authentication details for the secrets using the CLI.
-
Installation instructions here : https://www.contrastsecurity.com/developer/codesec
-
If you are a new user, create an account with the 'contrast auth' command
-
Run the 'contrast config' command in the CLI to collect the required credentials
-
-
Licensed Contrast Security users: Get your authentication details for the secrets from the 'User Settings' menu in the Contrast web interface: You will need the following
-
Copy one of the sample workflows below and create a branch of your code to add Contrast Security SCA. This branch is typically located at
.github/workflows/build.yml
-
Update the workflow file to specify when the action should run (for example on pull_request, on push)
on: pull_request: branches: - "main"
-
Update the filepath in the workflow file to specfy the location of the project configuration file where dependencies are declared
filePath: package.json
-
To fail based on severity of CVEs found set severity (critical/high/medium or low) and fail to true
severity: medium fail: true
-
After committing, create a Pull Request (PR) to merge the update back to your main branch. Creating the PR triggers the Contrast Security SCA action to run.
The following are sample workflows to get started in Java, Node, PHP.
name: Contrast Security SCA
on:
push:
branches:
- "main"
jobs:
Check-Dependency-Vulnerabilities:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Set up JDK 11
uses: actions/setup-java@v3
with:
java-version: '11'
distribution: 'adopt'
- name: build jar
run: |
mvn clean install -DskipTests
- name: Contrast SCA Action
uses: Contrast-Security-OSS/contrast-sca-action@v1
with:
apiKey: ${{ secrets.CONTRAST_API_KEY }}
orgId: ${{ secrets.CONTRAST_ORGANIZATION_ID }}
authHeader: ${{ secrets.CONTRAST_AUTH_HEADER }}
apiUrl: ${{ secrets.CONTRAST_API_URL }}
filePath: mypath/to/config/files
severity: medium
fail: true
name: Contrast Security SCA
on:
pull_request:
branches:
- "main"
jobs:
Check-Dependency-Vulnerabilities:
runs-on: ubuntu-latest
steps:
# Checkout/build your application/install Node
- uses: actions/checkout@v3
- name: Contrast SCA Action
uses: Contrast-Security-OSS/contrast-sca-action@v1
with:
apiKey: ${{ secrets.CONTRAST_API_KEY }}
orgId: ${{ secrets.CONTRAST_ORGANIZATION_ID }}
authHeader: ${{ secrets.CONTRAST_AUTH_HEADER }}
apiUrl: ${{ secrets.CONTRAST_API_URL }}
filePath: mypath/to/config/files
severity: medium
fail: true
name: Contrast Security SCA
on:
push:
branches:
- "main"
jobs:
Check-Dependency-Vulnerabilities:
runs-on: ubuntu-latest
steps:
# Check out/build your application
- uses: actions/checkout@v3
# Install composer
- uses: php-actions/composer@v6
- name: Contrast SCA Action
uses: Contrast-Security-OSS/contrast-sca-action@v1
with:
apiKey: ${{ secrets.CONTRAST_API_KEY }}
orgId: ${{ secrets.CONTRAST_ORGANIZATION_ID }}
authHeader: ${{ secrets.CONTRAST_AUTH_HEADER }}
apiUrl: ${{ secrets.CONTRAST_API_URL }}
filePath: mypath/to/config/files
severity: medium
fail: true
- Supported languages and their requirements:
- Java: pom.xml and Maven build platform including the dependency plugin
or build.gradle and gradle dependencies or ./gradlew dependencies must be
supported - .NET core: MSBuild 15.0 or greater and a
packages.lock.json file.
Note: If the packages.lock.json file is unavailable it can be generated by
setting RestorePackagesWithLockFile to true within each *.csproj file and
running dotnet build. - Node: package.json and a lock file (either .package-lock.json or .yarn.lock.)
- Ruby: gemfile and gemfile.lock
- Python: pipfile and pipfile.lock
- Go: go.mod
- PHP: composer.json and composer.lock
- Java: pom.xml and Maven build platform including the dependency plugin
All Contrast Security related account secrets should be configured as GitHub secrets and will be passed via environment variables in the GitHub runner.
This section details the various inputs you can use with this Contrast Security GitHub Action. Inputs marked as "required" must be provided for the action to function correctly.
- apiKey: An agent API key provided by Contrast (required).
- authHeader: User authorization credentials provided by Contrast (required).
- orgId: The ID of your organization in Contrast (required).
- filePath: Specify the directory in which to search for project configuration files (required).
- command: Command to run cli with audit/fingerprint/sarif (optional, defaults to "audit")
- repositoryId: The ID of your repo. (optional)
- projectGroupId: The ID of your project Groups. (optional)
- applicationId: The ID of your application. (optional)
- apiUrl: The name of the host. Includes the protocol section of the URL (https://). Defaults to https://ce.contrastsecurity.com. (optional, defaults to "https://ce.contrastsecurity.com")
- severity: Allows user to report libraries with vulnerabilities above a chosen severity level. Values for level are high, medium or low. (Note: Use this input in combination with the fail input, otherwise the action will exit) (optional, defaults to "CRITICAL")
- fail: When set to true, fails the action if CVEs have been detected that match at least the severity option specified. (optional)
- ignoreDev: When set to true, excludes developer dependencies from the results. (optional)
- outputSummary: Defaults to true. When set to true, writes the output of the audit to the GitHub Actions Summary. (optional, defaults to "true")
- repoUrl: When set, will pass the optional repo url parameter to the contrast cli (optional)
- repoName: When set, will pass the optional repo name parameter to the contrast cli (optional)
- externalId: When set, will pass the optional external id parameter to the contrast cli (optional)
- auditTimeout: Sets the timeout for an audit in seconds, Default: 600 (10 minutes) (optional, defaults to "600")
- metadata: Metadata filter to be passed to the Contrast CLI when running sarif command (optional)
- ghasEnabled: When set to true, will upload sarif to the GHAS integration (optional, defaults to "true")
- legacy: When set to true, uses the legacy audit command. (optional)
- modifier: When set this will be added as a suffix to the output file names for logs and sboms uploaded to the summary page. (optional, defaults to a random string)