Replies: 4 comments 3 replies
-
Hi @Lucassino, I see your point. Personally I don't like breaking CI pipelines for these checks, but I know from discussions within my company there are other opinions. I would like to implement a solution that works for other scanners as well, so it might be something like |
Beta Was this translation helpful? Give feedback.
-
Hi @Lucassino, I had a rethink about it and would propose something different. The right way to control the CI pipeline would be to utilize SecObserve's security gate. This would
I will write an action / template to read the security gate of a product and set an exit code 1, if the security gate has failed. Does that make sense for you? |
Beta Was this translation helpful? Give feedback.
-
Hello @StefanFl , sorry for the delay in the response. That makes sense! I'm glad that you guys thought about my concerns. Also, i'll share in a PR the Helm Chart so you can review! Kind regards |
Beta Was this translation helpful? Give feedback.
-
The action and template for the check of the security gate have been released, see https://github.com/MaibornWolff/secobserve_actions_templates/releases/tag/v2024_11_2. Thanks again @Lucassino for your impulse. |
Beta Was this translation helpful? Give feedback.
-
In order to implement trivy scanners in my pipeline, i want to stop the step if it finds a critical vulnerability in my FS. To do so, i need to change the parameter "--exit-code 0" to --exit-code 1".
My main idea is to turn this parameter as a variable, so when i config my step in github actions i can pass the value that i want.
For example
trivy filesystem $FURTHER_PARAMETERS --quiet --exit-code $EXIT_CODE --format cyclonedx --scanners vuln --output "$WORKSPACE/$REPORT_NAME" "$TARGET"
What do you guys think?
Beta Was this translation helpful? Give feedback.
All reactions