From 24db39eae28ecdf4844fa8fe45af15f434dd5701 Mon Sep 17 00:00:00 2001 From: Jason White Date: Mon, 18 Mar 2024 19:12:13 +0000 Subject: [PATCH 1/3] test semgrep --- .github/workflows/semgrep.yml | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 .github/workflows/semgrep.yml diff --git a/.github/workflows/semgrep.yml b/.github/workflows/semgrep.yml new file mode 100644 index 000000000..d96073a2c --- /dev/null +++ b/.github/workflows/semgrep.yml @@ -0,0 +1,35 @@ +# Name of this GitHub Actions workflow. +name: Semgrep OSS scan + +on: + # Scan changed files in PRs (diff-aware scanning): + pull_request: {} + # Scan on-demand through GitHub Actions interface: + workflow_dispatch: {} + # Scan mainline branches and report all findings: + push: + branches: ["master", "main"] + # Schedule the CI job (this method uses cron syntax): + schedule: + - cron: '25 19 * * *' # Sets Semgrep to scan every day at 19:25 UTC. + # It is recommended to change the schedule to a random time. + +jobs: + semgrep: + # User definable name of this GitHub Actions job. + name: semgrep-oss/scan + # If you are self-hosting, change the following `runs-on` value: + runs-on: ubuntu-latest + + container: + # A Docker image with Semgrep installed. Do not change this. + image: semgrep/semgrep + + # Skip any PR created by dependabot to avoid permission issues: + if: (github.actor != 'dependabot[bot]') + + steps: + # Fetch project source with GitHub Actions Checkout. + - uses: actions/checkout@v3 + # Run the "semgrep scan" command on the command line of the docker image. + - run: semgrep scan --config auto \ No newline at end of file From d2049a8fccafabbe07065f3204feff09d30e4cd7 Mon Sep 17 00:00:00 2001 From: Jason White Date: Mon, 18 Mar 2024 19:13:50 +0000 Subject: [PATCH 2/3] updating for testing --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index 84391b8c6..63b912512 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,7 @@ # WebGoat 8: A deliberately insecure Web Application +Adding this line to test a merge for the semgrep Action running vanilla in Actions + [![Build](https://github.com/WebGoat/WebGoat/actions/workflows/build.yml/badge.svg?branch=develop)](https://github.com/WebGoat/WebGoat/actions/workflows/build.yml) [![java-jdk](https://img.shields.io/badge/java%20jdk-17-green.svg)](https://jdk.java.net/) [![OWASP Labs](https://img.shields.io/badge/OWASP-Lab%20project-f7b73c.svg)](https://owasp.org/projects/) From b79c83a52eae3306bbe1026ba7d91e63774c2256 Mon Sep 17 00:00:00 2001 From: Jason White Date: Mon, 18 Mar 2024 19:19:06 +0000 Subject: [PATCH 3/3] linty --- .github/workflows/semgrep.yml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/.github/workflows/semgrep.yml b/.github/workflows/semgrep.yml index d96073a2c..46bd87fcf 100644 --- a/.github/workflows/semgrep.yml +++ b/.github/workflows/semgrep.yml @@ -32,4 +32,5 @@ jobs: # Fetch project source with GitHub Actions Checkout. - uses: actions/checkout@v3 # Run the "semgrep scan" command on the command line of the docker image. - - run: semgrep scan --config auto \ No newline at end of file + - run: semgrep scan --config auto + \ No newline at end of file