This page contains starter kit information, which represent templates, code and configuration to help you get started quickly with continuous testing best practices described in this overall guide. Please see categories and links below for details.
This section contains links to sample actions, templates and configurations that analyze and validate composition of Open Source Software (OSS) components in software systems. Identifying software and licensing vulnerabilites and ensuring routine software updates is an OSS cybersecurity best practice.
A GitHub ecosystem tool for dependency version and security vulnerability analysis.
This Dependabot task provides an automated check for OSS component updates and automatically creates pull requests to commit new versions.
Starter Kit:
- SLIM Starterkit Python -- Dependabot Script to install in your GitHub repo
To leverage Dependabot, make sure to do the following:
- Discuss with your development team the cybersecurity best practice to regularly update OSS to latest versions and seek consensus on a workflow to accept proposed updates.
- Add Dependabot automation to your repository, either via the admin console or manually (choose one):
Shortcut
Copy the pre-set configuration to an identical path in your repository, e.g..github/dependabot.yml
.
- Admin console: (requires admin rights)
- Manually: (approach available to all committers)
- Create an issue and an issue branch to implement a code change. Checkout the issue branch.
- Copy the Dependabot configuration file from one of the SLIM Starterkit repos -- for example,
dependabot.yml
in the Python Starterkit -- into the root of your repository at.github/dependabot.yml
.
- Modify Dependabot configurations for your project:
Requirement
Set properties to match your repository setup, including core packaging system.
- Set the
package-ecosystem
property to match your packaging system independabot.yml
. - Set the
target-branch
to the name of your default branch independabot.yml
. - Optionally, value-added features may be set, including such settings as scheduling, a strategy for versioning and pull request reviewers.
- Dependabot is now installed and detections can be tracked through the dependency graph at
Insights
->Dependency graph
->Dependabot
. Pull Requests also will include automatically created Dependabot merges.
This Dependabot task automates security scanning for known vulnerabilities in OSS components and automatically creates pull requests to update flagged components.
Dependabot Security Updates requires Dependabot Automated Dependency Updates (see above). Although technically part of the same automation stack, it's enabled through the GitHub Settings UI. Optionally, dependency updates can be disabled so that only security updates create pull requests.
Requirement
Install and set up the Starter Kit for Dependabot Automated Dependency Updates.
To leverage this template, make sure to do the following:
- Discuss with your development team the cybersecurity best practice to regularly scan OSS components for security flaws and seek consensus on a workflow to accept proposed updates.
- Enable Security Updates:
- At
Settings
->Code security and analysis
->Dependabot
, select theEnable
button to turn onDependabot security updates
.
- At
Requirement
Admin rights are necessary to modifyCode security and analysis
settings.
- Modify Dependabot configurations for your project: (optional)
- If only security-related pull requests are desired, set the
open-pull-requests-limit
property to0
forupdates
block(s).
- If only security-related pull requests are desired, set the