Skip to content

Fully open-source security audit for project dependencies based on known vulnerabilities and advisories. No server required!

License

Notifications You must be signed in to change notification settings

AppThreat/dep-scan-action

Use this GitHub action with your project
Add this Action to an existing workflow or create a new one
View on Marketplace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

Introduction

This action wraps OWASP-dep-scan, a fully open-source security audit tool for project dependencies based on known vulnerabilities and advisories. The output is fully compatible with grafeas.

Please consider making a monetary contribution to OWASP-dep-scan. We appreciate your support!

Usage

Inputs

With minimal configuration

- uses: AppThreat/dep-scan-action@master
  with:
    # The target directory to be scanned. Optional.
    src: /github/workspace
    # Output file for the generated report. Optional.
    report_file: /github/workspace/reports/depscan.json
    # Must equal "I have sponsored OWASP-dep-scan" for action to run. Required.
    profile: generic
    thank_you: "I have not sponsored OWASP-dep-scan."
  env:
    VDB_HOME: ${{ github.workspace }}/db
    GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

Upload reports to build artifacts

- uses: AppThreat/dep-scan-action@master
  with:
      thank_you: "I have sponsored OWASP-dep-scan."
  env:
    VDB_HOME: ${{ github.workspace }}/db
    GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- uses: actions/upload-artifact@v4
  with:
    name: reports
    path: reports

About

Fully open-source security audit for project dependencies based on known vulnerabilities and advisories. No server required!

Resources

License

Stars

Watchers

Forks

Packages

No packages published