You're viewing an older version of this GitHub Action. Do you want to see the latest version instead?
GitHub Action
SecureStack All-In-One GitHub Action
v0.1.0
A GitHub Action that analyses your java source code for all versions of the log4j vulnerability that affect both log4j 1.x and 2.x. You can read more about all versions of Log4j that are affected here: https://logging.apache.org/log4j/2.x/security.html
name: Example Workflow Using SecureStack All-In-One Action
on: push
jobs:
security:
runs-on: ubuntu-latest
steps:
- name: Checkout repo for running secrets analysis within workflow
id: checkout
uses: actions/[email protected]
with:
fetch-depth: 0
- name: Secrets Analysis Step
id: secrets
uses: SecureStackCo/[email protected]
with:
securestack_api_key: ${{ secrets.SECURESTACK_API_KEY }}
securestack_app_id: ${{ secrets.SECURESTACK_APP_ID }}
severity: critical
flags: '-d 1'
- name: Code Analysis Step
id: code
uses: SecureStackCo/[email protected]
with:
securestack_api_key: ${{ secrets.SECURESTACK_API_KEY }}
securestack_app_id: ${{ secrets.SECURESTACK_APP_ID }}
severity: critical
language: node
- name: Exposure Analysis Step
id: exposure
uses: SecureStackCo/[email protected]
with:
securestack_api_key: ${{ secrets.SECURESTACK_API_KEY }}
securestack_app_id: ${{ secrets.SECURESTACK_APP_ID }}
severity: critical
flags: '--dom -r'
- Log in to SecureStack and go to the Profile -> GENERATE KEY screen.
- Generate an API key and copy the value.
- Go to Settings for your GitHub repository and click on Secrets -> Actions at the bottom left.
- Create a new secret named SECURESTACK_API_KEY and paste the value from step 2 into the field.
- Log in to SecureStack.
- Open the application you wish to analyse.
- Copy the value of the application id on the View Application screen.
- Go to Settings for your GitHub repository and click on Secrets -> Actions at the bottom left.
- Create a new secret named SECURESTACK_APP_ID and paste the value from step 3 into the field.
- SecureStack Secrets Analysis - Scan your application for embedded api keys, credentials and senstive data.
- SecureStack Software Composition Analysis (SCA) - Scan your application for vulnerable third-party and open source libraries.
- SecureStack Web Vulnerability & Cloud Misconfiguration Analysis - Scan your running application url for cloud misconfigurations and web vulnerabilities.
Made with 💜 by SecureStack