Skip to content

Lacework scan

Lacework scan #9

Workflow file for this run

name: Lacework Scan
on:
pull_request:
branches:
- master
jobs:
lacework-scan:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v2
- name: Scan the repo for vulnerabilities in IaC
run: |
# Required to pass the GITHUB and Lacework (LW) environment variables to use
env | grep "GITHUB_\|LW_\|CI_" > env.list
# Required command based on what you want to scan in the repository
echo "SCAN_COMMAND=tf-scan" >> env.list
# Required if you are not mounting the volume on /app
echo "WORKSPACE=src" >> env.list
# if we want to fail the step for any critical failed findings (violations) in the assessment scan
# echo "EXIT_FLAG='Medium'" >> env.list
docker run --env-file env.list -v "$(pwd):/app/src" lacework/codesec-iac:latest > output.txt
# display output.txt in the console
cat ./output.txt
echo "::set-output name=scan_results::$(output.txt)"
env:
LW_ACCOUNT: ${{ secrets.LW_ACCOUNT }}
LW_API_KEY: ${{ secrets.LW_API_KEY }}
LW_API_SECRET: ${{ secrets.LW_API_SECRET }}
- name: Use Scan Results
run: |
# Use the output from the previous step
echo "Scan Results: ${{ steps.scan_step.outputs.scan_results }}"
# - name: Install Azure CLI
# run: |
# ls -al
# npm install -g azure-cli
# - name: Open Azure DevOps Ticket
# if: steps.sast_number.outputs.number == '2'
# run: |
# az config set extension.use_dynamic_install=yes_without_prompt
# az extension add --name azure-devops
# echo ${{ secrets.PAT_AZURE }} | az devops login --organization "https://dev.azure.com/markvolfson/"
# az devops configure --defaults organization=https://dev.azure.com/markvolfson/ project=appsec-demo
# az boards work-item create --title "PR Failed - Checkmarx Results" --type "Task" --description "${{ steps.extract_info.outputs.description }}"
# - name: Quality Gate
# id: quality-gate
# if: steps.sast_number.outputs.number == '2'
# run: |
# failure("Code contains security vulnerabilities")