Skip to content

Commit

Permalink
Merge pull request #8 from accurics/sarif
Browse files Browse the repository at this point in the history
Updates readme to clarify code scanning support
  • Loading branch information
cesar-rodriguez authored Jun 25, 2021
2 parents 4b24816 + 5a49d3f commit a549e42
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 2 deletions.
6 changes: 4 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# Terrascan GitHub Action
This action runs Terrascan, a static code analyzer for infrastructure as code(IaC) security best practices. It supports displaying the results of the scan in the GitHub repository's Security tab, when the `sarif_upload` input variable is set to true.
This action runs Terrascan, a static code analyzer for infrastructure as code(IaC) security best practices. It supports displaying the results of the scan in the GitHub repository's Security tab under [code scanning alerts](https://docs.github.com/en/code-security/secure-coding/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning), when the `sarif_upload` input variable is included.

## Inputs
### `iac_type`
Expand Down Expand Up @@ -30,7 +30,7 @@ Config file path.
The action will only warn and not error when violations are found.

### `sarif_upload`
If true, a sarif file named terrascan.sarif will be generated with the results of the scan.
If this variable is included, a sarif file named terrascan.sarif will be generated with the results of the scan.

## Example usage

Expand Down Expand Up @@ -64,6 +64,8 @@ jobs:

Using the SARIF output option, the results of the scan will be displayed in the security tab of the repository being scanned. The example below shows how to accomplish this. More information on GitHub code scanning is available [here](https://docs.github.com/en/code-security/secure-coding/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning#about-third-party-code-scanning-tools).

![Image of code scanning results](code-scanning.png)

```yaml
on: [push]

Expand Down
Binary file added code-scanning.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit a549e42

Please sign in to comment.