Combination of tools for SAST Scanning
These simple steps will run blind SAST scan against your code and generate html and xml report with some low hanging fruits Currently we have:
- python
- ruby
project_name
- the name of your project will be displayed in reports
environment
- name of brunch or any other identified to be used in reports
path_to_your_code
- path do the code on your local machine
your_local_path_to_reports
- path on your local filesystem where you want to store reports from this execution
For example:
docker run -t \
-e project_name=MY_PET_PROJECT -e environment=master \
-v <your_local_path_to_reports>:/tmp/reports \
-v <path_to_your_code>:/code \
--name=dusty --rm \
getcarrier/sast:latest -s sast
Report is located in your your_local_path_to_reports
folder
Scans can be configured using scan-config.yaml
file.
sast # Name of the scan
# General configuration section
project_name: $project_name # the name of the project used in reports
environment: $environment # literal name of environment (e.g. prod/stage/etc.)
# Reporting configuration section (all report types are optional)
html_report: true # do you need an html report (true/false)
junit_report: true # do you need an xml report (true/false)
langugage: ruby # the language of application to be scanned
configuration can be mounted to container like
-v <path_to_local_folder>/scan-config.yaml:/tmp/scan-config.yaml
User need to fill false_positive.config
file with titles of false-positive issues and mount it to container
-v <path_to_local_folder>/false_positive.config:/tmp/false_positive.config