KDT is a command line client for Kondukto written in Go. It interacts with Kondukto engine through public API.
With KDT, you can list projects and their scans in Kondukto, and restart a scan with a specific application security tool. KDT is also easy to use in CI/CD pipelines to trigger scans and break releases if a scan fails or scan results don't met specified release criteria.
Kondukto is an Application Security Testing Orchestration platform that helps you centralize and automate your entire AppSec related vulnerability management process. Providing an interface where security health of applications can be continuously monitored, and a command line interface where your AppSec operations can be integrated into DevOps pipelines, Kondukto lets you manage your AppSec processes automatically with ease.
You can install the CLI with a curl
utility script or by downloading the pre-compiled binary from the Github release page.
Once installed youl'll get the kdt-cli
command and kdt
alias.
Utility script with curl
:
$ curl -sSL https://cli.kondukto.io | sudo sh
Non-root with curl:
$ curl -sSL https://cli.kondukto.io | sh
To install the kdt-cli on Windows go to Releases and download the latest kdt-cli.exe.
Or you can also simply run the following if you have an existing Go environment:
go get github.com/kondukto-io/kdt
If you want to build it yourself, clone the source files using Github, change into the kdt
directory and run:
git clone https://github.com/kondukto-io/kdt.git
cd kdt
go install
KDT needs Kondukto host and an API token for authentication. API tokens can be created under Integrations/API Tokens menu.
You can provide configuration by:
(example is for BASH shell)
$ export KONDUKTO_HOST=http://localhost:8080
$ export KONDUKTO_TOKEN=WmQ2eHFDRzE3elplN0ZRbUVsRDd3VnpUSHk0TmF6Uko5OGlyQ1JvR2JOOXhoWEFtY2ZrcDJZUGtrb2tV
It is always better to set environment variables in shell profile files(~/.bashrc
, ~/.zshrc
, ~/.profile
etc.)
Default path for config file is $HOME/.kdt.yaml
. Another file can be provided with --config
command line flag.
// $HOME/.kdt.yaml
host: http://localhost:8088
token: WmQ2eHFDRzE3elplN0ZRbUVsRDd3VnpUSHk0TmF6Uko5OGlyQ1JvR2JOOXhoWEFtY2ZrcDJZUGtrb2tV
kdt list projects --host http://localhost:8088 --token WmQ2eHFDRzE3elplN0ZRbUVsRDd3VnpUSHk0TmF6Uko5OGlyQ1JvR2JOOXhoWEFtY2ZrcDJZUGtrb2tV
Most KDT commands are straightforward.
To list projects: kdt list projects
To list scans of a project: kdt list scans -p ExampleProject
To restart a scan, you can use one of the following:
-
id of the scan:
kdt scan -s 5da6cafa5ab6e436faf643dc
-
project and tool names:
kdt scan -p ExampleProject -t ExampleTool
To import scan results as a file: kdt scan -p ExampleProject -t ExampleTool -b master
KDT has several helpful flags to manage scans.
Following flags are valid for all commands of KDT.
--host
: HTTP address of Kondukto server with port
--token
: API token generated by Kondukto
--config
: Configuration file to use instead of default one($HOME/.kdt.yaml
)
--async
: Starts an asynchronous scan that won't block process to wait for scan to finish. KDT will exit gracefully when scan gets started successfully.
--insecure
: If provided, client skips verification of server's certificates and host name. In this mode, TLS is susceptible to man-in-the-middle attacks. Not recommended unless you really know what you are doing!
-v
or --verbose
: Prints more and detailed logs. Useful for debugging.
Following flags are only valid for scan commands.
-p
or --project
for providing project name or id
-t
or --tool
for providing tool name
-s
or --scan-id
for providing scan id
-b
or --branch
for providing branch to scan
These flags represent maximum number of vulnerabilities with specified severity to ignore. If these threshold are crossed, KDT will exit with non-zero status code.
--threshold-crit
--threshold-high
--threshold-med
--threshold-low
--threshold-risk
for failing tests if the scan causes a higher risk score than the last scan's risk score. Useful for keeping a project's security level under control. If used with every scan in DevOps pipelines, you will make sure that the project will never get more vulnerable.
Risk threshold considers only the last two scans with the same tool. If the project does not have a scan with the tool, KDT will fail since it will not be able to compare risk scores.
Threshold flags don't work with --async
flag since KDT will exit when scan gets started, and won't be able to check scan results
Example Usage:
kdt scan -p SampleProject -t SampleTool --threshold-crit 3 --threshold-high 10 --threshold-risk
KDT supports all scanners enabled in Kondukto server, to see the list simply run kdt list scanners
.
Example Usage:
./kdt --config kondukto.yaml list scanners
Name ID Type Trigger Labels
---- -- ---- ------- ------
gosec 60eec8a83e9e5e6e2ae52d06 sast new scan docker,kdt
semgrep 60eec8a53e9e5e6e2ae52d05 sast rescan template,docker,kdt
checkmarx
checkmarxsca
owaspzap
webinspect
netsparker
appspider
bandit
findsecbugs
dependencycheck
fortify
gosec
brakeman
securitycodescan
trivy
hclappscan
owaspzapheadless
nancy
semgrep
veracode
burpsuite
burpsuiteenterprise
There are multiple cases that you can use KDT in your pipeline.
kdt --config kondukto-config.yml \
--insecure \
scan \
--project SampleProject \
--tool fortify \
--file results.fpr \
--branch develop \
--threshold-crit 0 \
--threshold-high 0`
- --config: Kondukto configuration file in yaml format
- --insecure: Don't verify SSL certificates
- scan: start scan
- --project: Application's name in Kondukto server.
- --tool: AST tool to be used (fortify).
- --file: Results filename, when file parameters is given scan will not be initiated and only the results file (results.fpr) is going to be analyzed.
- --branch: Branch name.
- --threshold-crit: Threshold value to "break the build" in the pipeline. When this parameter(s) is given, entered security criteria will be overwritten.
kdt --config kondukto-config.yml \
scan \
--project SampleProject \
--tool trivy \
--image ubuntu@256:ab02134176aecfe0c0974ab4d3db43ca91eb6483a6b7fe6556b480489edd04a1 \
--branch develop \
- --config: Kondukto configuration file in yaml format
- scan: start scan
- --project: Application's name in Kondukto server.
- --tool: AST tool to be used (trivy).
- --image: Image name to be scanned. Name can be given with the digest or with the tag name (ubuntu:latest).
kdt --config kondukto-config.yml \
create \
project \
--repo-id https://github.com/kondukto-io/kdt \
--labels GDPR,Internal \
--alm-tool github \
- --config: Kondukto configuration file in yaml format
- create: Base command for create operation.
- project: Subcommand to create project.
- --repo-id: Project repository URL or ALM ID.
- --labels: Associate project with a label list
- --alm-tool: If there is more than one ALM enabled in Kondukto you need to specify ALM tool, otherwise it is not necessary.
- --team: Specify a team name. By default team name is
default team
.
This command will create a project on Kondukto with the same name in your ALM(Application Lifecycle Management) tool. If there is another project
with the same name, command will print an error message and exit with a status code. You can pass --force-create
flag to overwrite this behaviour.
If you wish to get involved in KDT development, create issues for problems and missing features or fork the repository and create pull requests to help the development directly.
Before sending your PRs:
-
Create and name your branches according to Git Flow methodology.
For new features:
feature/example-feature-branch
For bug fixes:
bugfix/example-bugfix-branch
-
Properly document your code following idiomatic Go practices. Exported functions should always be commented.
-
Write detailed PR descriptions and comments