Skip to content

Add ShiftLeft build rules #1

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

Conversation

gacevedo
Copy link
Owner

@gacevedo gacevedo commented Feb 3, 2025

Qwiet LogoQwiet Logo

This pull request enables build rules. You can read more about build rules here. The build rules are controlled by the shiftleft.yml file in the repository.

Visit app.shiftleft.io to see the security findings for this repository.

We've done a few things on your behalf

  • Forked this demo application
  • Generated a unique secret SHIFTLEFT_ACCESS_TOKEN to allow GitHub Actions in this repository to communicate with the Qwiet (Shiftleft) API
  • Committed a GitHub Action that will invoke Qwiet preZero's Static Application Security Testing (SAST) on all future pull requests on this repository
  • Created this pull request that demonstrates build rules. It also adds a status check that displays the result of the GitHub Action

Questions? Comments? Want to learn more? Get in touch with us or check out our documentation.

Copy link

github-actions bot commented Feb 3, 2025

Qwiet LogoQwiet Logo

Checking analysis of application shiftleft-ruby-demo against 3 build rules.

Using sl version 0.9.3014 (ee164301a14139a6d1d84305d2c94ce326e69c11).

Checking findings on scan 3.

Results per rule:

  • Allow no critical findings: FAIL
    (10 matched vulnerabilities; configured threshold is 0).

    First 5 findings:

       ID   CVSS    Rating    CVE              Title                                                                                                                   
     33    9.0   critical                    Remote Code Execution: Command Injection Through Attacker-controlled Data via self in BenefitFormsController.upload 
     36    9.0   critical                    Directory Traversal: Attacker-controlled Data Used in File Path via self in BenefitFormsController.upload           
     42    9.0   critical                    SQL Injection: Attacker-controlled Data Used in SQL Query via self in UsersController.update                        
     52    9.0   critical   CVE-2021-30139   pkg:pkg/alpine/[email protected]                                                                                      
     53    9.0   critical   CVE-2021-36159   pkg:pkg/alpine/[email protected]                                                                                      
     Severity rating   Count 
     Critical             10 
     High                  0 
     Medium                0 
     Low                   0 
     Finding Type   Count 
     Container          7 
     Vuln               3 
     Category                Count 
     SQL Injection               1 
     Remote Code Execution       1 
     Directory Traversal         1 
     CVE              Count 
     CVE-2022-28391       2 
     CVE-2021-3711        2 
     CVE-2022-37434       1 
     CVE-2021-36159       1 
     CVE-2021-30139       1 
     OWASP 2021 Category         Count 
     A03-Injection                   2 
     A01-Broken-Access-Control       1 
  • Allow one OSS or container finding: FAIL
    (67 matched vulnerabilities; configured threshold is 1).

    First 5 findings:

        ID   CVSS    Rating    CVE              Title                                                                                                                                                     
      52    9.0   critical   CVE-2021-30139   pkg:pkg/alpine/[email protected]                                                                                                                        
      53    9.0   critical   CVE-2021-36159   pkg:pkg/alpine/[email protected]                                                                                                                        
      69    9.0   critical   CVE-2022-28391   CVE-2022-28391 affecting package busybox for versions less than 1.36.1-3. A patched version of the package is available.                                  
      88    9.0   critical   CVE-2021-3711    In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this fu…
     120    9.0   critical   CVE-2021-3711    In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this fu…
     Severity rating   Count 
     Critical              7 
     High                 46 
     Medium               12 
     Low                   2 
  • Allow no reachable OSS vulnerability: pass
    (0 matched vulnerabilities; configured threshold is 0).

2 rules failed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant