Automated multi-scanner vulnerability detection for CI/CD pipelines with web dashboard
SecureFlow is a comprehensive DevSecOps security scanning orchestrator that integrates multiple industry-standard security tools into a unified platform. It detects vulnerabilities in source code, dependencies, and secrets, presenting findings through both a beautiful CLI and an interactive web dashboard.
Most security tools work in isolation. SecureFlow orchestrates them all:
Your Code → SecureFlow → Semgrep (Code Analysis)
→ Trivy (Dependencies)
→ TruffleHog (Secrets)
→ Unified Report + Dashboard
- 🔍 SAST - Semgrep static code analysis
- 📦 SCA - Trivy dependency vulnerability scanning
- 🔑 Secret Detection - TruffleHog git history scanning
- 📊 Unified Reporting - Aggregated results from all scanners
- 💾 JSON Export - Machine-readable results for CI/CD
- 🌐 Interactive Dashboard - Beautiful web interface
- 📈 Visual Charts - Severity and scanner breakdown
- 🎨 Modern UI - Clean, responsive design
- 📋 Detailed Reports - Vulnerability details view
- 🎨 Colored Output - Color-coded severity indicators
- 📂 Smart Categorization - By type and severity
- 🔧 Flexible Options - Run individual or all scanners
| Category | Tool | Severity |
|---|---|---|
| Code Injection | Semgrep | 🔴 Critical |
| SQL Injection | Semgrep | 🔴 Critical |
| Command Injection | Semgrep | 🔴 Critical |
| XSS | Semgrep | 🔴 Critical |
| Hardcoded Secrets | Semgrep + TruffleHog | 🔴 Critical |
| Path Traversal | Semgrep | 🟠 High |
| Vulnerable Dependencies | Trivy | 🟠 High |
| Weak Cryptography | Semgrep | 🟡 Medium |
| Security Misconfig | Semgrep | 🟡 Medium |
| Template Injection | Semgrep | 🔴 Critical |
# Clone the repository
git clone https://github.com/kksr1994/SecureFlow.git
cd SecureFlow
# Create virtual environment
python3 -m venv venv
source venv/bin/activate
# Install dependencies
pip install -r requirements.txt
# Verify all tools
python3 cli/main.py check# Check tools
python3 cli/main.py check
# Scan with Semgrep (code analysis)
python3 cli/main.py scan -t /path/to/project -s semgrep
# Scan with Trivy (dependencies)
python3 cli/main.py scan -t /path/to/project -s trivy
# Scan with TruffleHog (secrets)
python3 cli/main.py scan -t /path/to/project -s trufflehog
# Run ALL scanners with unified report
python3 cli/main.py scan -t /path/to/project -s all
# Show all findings
python3 cli/main.py scan -t /path/to/project -s all --all# Start dashboard
python3 dashboard/app.py
# Open browser
# http://localhost:5000╔═══════════════════════════════════════════════════════╗
║ 🔒 SECUREFLOW v2.0 🔒 ║
║ Your DevSecOps Security Scanner Orchestrator ║
║ Now with 3 Integrated Scanners! ║
╚═══════════════════════════════════════════════════════╝
================================================================================
📊 SECUREFLOW UNIFIED SECURITY REPORT
================================================================================
🕐 Scan Time: 2026-02-16T16:24:05
🔧 Scanners Used: Semgrep, Trivy, TruffleHog
📈 OVERALL SUMMARY:
Total Security Findings: 32
🎯 By Severity:
🔴 CRITICAL: 12
🟠 HIGH: 2
🟡 MEDIUM: 18
🟢 LOW: 0
🔍 By Scanner:
Semgrep (SAST): 27 findings
Trivy (SCA): 4 findings
TruffleHog (Secrets): 1 finding
💡 RECOMMENDATIONS:
⚠️ 12 CRITICAL issues require IMMEDIATE attention!
🟠 2 HIGH severity issues should be fixed soon
🟡 18 MEDIUM issues - plan to address
================================================================================
SecureFlow/
├── cli/
│ └── main.py # CLI interface
├── scanners/
│ ├── semgrep_scanner.py # SAST scanning
│ ├── trivy_scanner.py # Dependency scanning
│ └── trufflehog_scanner.py # Secret detection
├── aggregator/
│ └── result_aggregator.py # Unified reporting
├── dashboard/
│ ├── app.py # Flask web server
│ ├── templates/dashboard.html # Web UI
│ └── static/css/style.css # Styling
├── data/scans/ # JSON results
├── docs/LEARNING_LOG.md # Dev journey
├── test-apps/
│ ├── vulnerable-app/ # Insecure examples
│ └── secure-example/ # Secure examples
└── requirements.txt
- Environment setup (Kali Linux, Python, tools)
- Project structure and architecture
- Tool verification
- Semgrep SAST integration
- CLI tool with colored output
- Found 27 vulnerabilities in test app!
- Trivy dependency scanner
- TruffleHog secret scanner
- Result aggregator and unified report
- Secure coding examples with encryption
- Total: 32 vulnerabilities detected!
- Flask web server
- Interactive HTML dashboard
- Chart.js visualizations
- Severity and scanner charts
- Recommendations display
- Semgrep SAST integration
- Trivy SCA integration
- TruffleHog secret detection
- Multi-scanner orchestration
- Unified security report
- Web dashboard with charts
- Secure coding examples
- CLI with colored output
- PDF report generation
- GitHub Actions integration
- Docker containerization
- Auto-fix suggestions
- Risk scoring algorithm
- Slack notifications
- Custom rule creation
- SARIF format export
# SQL Injection - BAD
sql = f"SELECT * FROM users WHERE name = '{user_input}'"
# Command Injection - BAD
os.system(f'ping -c 1 {user_input}')
# Hardcoded Secret - BAD
API_KEY = "sk_live_abc123"# SQL Injection prevention
cursor.execute("SELECT * FROM users WHERE name = ?", (user_input,))
# Command Injection prevention
subprocess.run(['ping', '-c', '1', host], capture_output=True)
# Secrets management
API_KEY = os.getenv('STRIPE_API_KEY')# .github/workflows/security.yml
name: Security Scan
on: [push, pull_request]
jobs:
security:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Run SecureFlow
run: |
pip install semgrep
python3 cli/main.py scan -t . -s all| Metric | Value |
|---|---|
| Lines of Code | 1,800+ |
| Files Created | 20+ |
| Scanners | 3 |
| Vulnerabilities Detected | 32 |
| Development Days | 4 |
| Commits | 9+ |
The test-apps/vulnerable-app/ directory contains intentionally vulnerable code for educational purposes. All API keys are FAKE test data. See test-apps/secure-example/ for proper security practices.
- Fork the repository
- Create feature branch:
git checkout -b feature/AmazingFeature - Commit:
git commit -m 'Add AmazingFeature' - Push:
git push origin feature/AmazingFeature - Open a Pull Request
MIT License - Copyright (c) 2026 kksr1994
kksr1994 - Security Enthusiast & Developer
- GitHub: @Kali-ai007
- Project: SecureFlow
- Semgrep, Trivy, TruffleHog teams
- OWASP for security resources
- Chart.js for visualizations
⭐ Star this repo if you found it useful!
Built with ❤️ over 4 intensive days of learning DevSecOps