Skip to content

next-demo-conversation-sast-b196051c #6

next-demo-conversation-sast-b196051c

next-demo-conversation-sast-b196051c #6

Workflow file for this run

name: Workflows generated by the MVS plan
run-name: ${{fromJSON(github.event.inputs.client_payload).payload.job_title}}
on:
workflow_dispatch:
inputs:
client_payload:
description: The Client payload
required: true
permissions:
contents: read
id-token: write
jobs:
docker-scan:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'docker-scan' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-docker-scan'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: trivy
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-trivy-alpine:latest
enrich:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'enrich' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-enrichment-code'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: enrichment
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-enrichment-slim:latest
iac-misconfig-detection-cloudformation:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'iac-misconfig-detection-cloudformation' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-iac-misconfiguration-detection'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: kics
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-kics-alpine:latest
security_control_output_file: /code/jit-report/results.json
iac-misconfig-detection-pulumi:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'iac-misconfig-detection-pulumi' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-iac-misconfiguration-detection'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: kics
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-kics-alpine:latest
security_control_output_file: /code/jit-report/results.json
iac-misconfig-detection-terraform:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'iac-misconfig-detection-terraform' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-iac-misconfiguration-detection'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: kics
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-kics-alpine:latest
security_control_output_file: /code/jit-report/results.json
remediation-pr:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'remediation-pr' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-remediation-pr'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: remediation-pr
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/open-remediation-pr-alpine:latest
security_control_output_file: /opt/code/jit-report/results.json
secret-detection:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'secret-detection' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-secret-detection'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: gitleaks
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-gitleaks-alpine:latest
security_control_output_file: /tmp/report.json
software-component-analysis-go:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-go' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: nancy
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-nancy-alpine:latest
software-component-analysis-js:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-js' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: npm-audit
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-npm-audit-slim:latest
security_control_output_file: /code/jit-report/enriched-audit-results.json
software-component-analysis-php:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-php' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: osv-scanner
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-osv-scanner-alpine:latest
security_control_output_file: /code/jit-report/osv-scanner-results.json
software-component-analysis-python:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'software-component-analysis-python' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sca'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: osv-scanner
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-osv-scanner-alpine:latest
security_control_output_file: /code/jit-report/enriched-osv-scanner-results.json
static-code-analysis-c-cpp:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-c-cpp' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-csharp:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-csharp' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-go:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-go' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: gosec
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-gosec-alpine:latest
static-code-analysis-java:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-java' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-js:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-js' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-kotlin:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-kotlin' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-php:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-php' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-python-semgrep:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-python-semgrep' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-ruby:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-ruby' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-rust:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-rust' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-scala:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-scala' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest
static-code-analysis-swift:
if: fromJSON(github.event.inputs.client_payload).payload.workflow_job_name == 'static-code-analysis-swift' && fromJSON(github.event.inputs.client_payload).payload.workflow_slug == 'workflow-sast'
runs-on: ubuntu-20.04
timeout-minutes: 20
steps:
- name: semgrep
uses: jitsecurity-controls/[email protected]
with:
security_control: registry.jit.io/control-semgrep-alpine:latest