Files
actions-sandbox/.gitea/workflows/security.yml
T
naomi 0b519b1529
Security Scan / Security Audit (push) Failing after 9m44s
Revert "fix semgrep configs"
This reverts commit b6c74febc9.
2025-12-11 14:58:28 -08:00

126 lines
4.1 KiB
YAML

name: Security Scan
on:
push:
branches: [ main ]
pull_request:
branches: [ main ]
schedule:
# Run weekly on Mondays at 00:00 UTC
- cron: '0 0 * * 1'
workflow_dispatch:
continue_on_error: true
jobs:
security:
name: Security Audit
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
# Manually install Trivy (workaround for Gitea Actions not supporting node24)
- name: Install Trivy
run: |
sudo apt-get update
sudo apt-get install wget apt-transport-https gnupg lsb-release -y
wget -qO /tmp/trivy-key.asc https://aquasecurity.github.io/trivy-repo/deb/public.key
sudo apt-key add /tmp/trivy-key.asc
echo "deb https://aquasecurity.github.io/trivy-repo/deb $(lsb_release -sc) main" | sudo tee -a /etc/apt/sources.list.d/trivy.list
sudo apt-get update
sudo apt-get install trivy -y
# Combined scan for vulnerabilities and IaC misconfigurations (secrets handled by Gitleaks)
- name: Run Trivy comprehensive security scan
uses: aquasecurity/trivy-action@master
with:
scan-type: 'fs'
scan-ref: '.'
scanners: 'vuln,misconfig'
format: 'table'
output: 'trivy-results.txt'
severity: 'CRITICAL,HIGH,MEDIUM,LOW,UNKNOWN'
# Fail on any vulnerability found
exit-code: '1'
# Don't ignore unfixed vulnerabilities
ignore-unfixed: false
# Skip database update to speed up scans (uses cached DB)
skip-db-update: false
# Skip setup since we installed Trivy manually
skip-setup-trivy: true
# Display results for visibility
- name: Display Trivy scan results
if: always()
run: |
if [ -f trivy-results.txt ]; then
echo "=== Trivy Security Scan Results ==="
cat trivy-results.txt
else
echo "No Trivy scan results found"
exit 1
fi
# Install Gitleaks for fast secret scanning
- name: Install Gitleaks
run: |
wget -O /tmp/gitleaks.tar.gz https://github.com/gitleaks/gitleaks/releases/latest/download/gitleaks_$(uname -s | tr '[:upper:]' '[:lower:]')_$(uname -m | sed 's/x86_64/amd64/').tar.gz
tar -xzf /tmp/gitleaks.tar.gz -C /tmp
sudo mv /tmp/gitleaks /usr/local/bin/
sudo chmod +x /usr/local/bin/gitleaks
gitleaks version
# Secret scanning with Gitleaks
- name: Run Gitleaks secret scan
run: |
gitleaks detect --source . --report-path gitleaks-results.json --report-format json --no-git
gitleaks detect --source . --report-path gitleaks-results.txt --report-format txt
# Display Gitleaks results
- name: Display Gitleaks scan results
if: always()
run: |
if [ -f gitleaks-results.txt ]; then
echo "=== Gitleaks Secret Scan Results ==="
cat gitleaks-results.txt
else
echo "No secrets detected by Gitleaks"
fi
if [ -f gitleaks-results.json ] && [ -s gitleaks-results.json ]; then
echo "=== Gitleaks JSON Results ==="
cat gitleaks-results.json
exit 1
fi
- name: Install Semgrep
run: |
sudo apt-get install pipx
pipx ensurepath
export PATH="$HOME/.local/bin:$PATH"
pipx install semgrep
semgrep --version
# Static code analysis with Semgrep
- name: Run Semgrep static analysis
run: |
export PATH="$HOME/.local/bin:$PATH"
semgrep --config p/security-audit \
--config p/owasp-top-ten \
--config p/ci \
--config p/security \
--output semgrep-results.txt \
.
# Display Semgrep results
- name: Display Semgrep scan results
if: always()
run: |
if [ -f semgrep-results.txt ]; then
echo "=== Semgrep Static Analysis Results ==="
cat semgrep-results.txt
else
echo "No Semgrep scan results found"
exit 1
fi