Skip to content

opensecdevops/osdo-sast

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

osdo-sast

Part of the OSDO Framework — Open SecDevOps

Static Application Security Testing with Semgrep, CodeQL, and language-specific analyzers

Quick Start

- uses: opensecdevops/osdo-sast@v2

Inputs

Input Description Required Default
path Path to scan for security vulnerabilities No .
language Programming language (auto, python, javascript, typescript, go, java, csharp, ruby, all) No auto
scanners Scanners to use (semgrep, codeql, bandit, eslint, all) No semgrep
severity-threshold Minimum severity to report (INFO, WARNING, ERROR) No WARNING
fail-on-finding Fail the action if vulnerabilities are found No true
semgrep-rules Semgrep ruleset (auto, p/security-audit, p/owasp-top-ten, p/cwe-top-25, custom path) No auto
results-dir Directory to store results No .osdo/results

Outputs

Output Description
findings Total vulnerabilities found
critical-count Critical severity count
high-count High severity count
sarif-file Path to SARIF output file

Example

name: Security Scan
on: [push, pull_request]

jobs:
  scan:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4
      - uses: opensecdevops/osdo-sast@v2
        with:
          path: "."
          language: "auto"
          scanners: "semgrep,codeql"
          severity-threshold: "WARNING"
          fail-on-finding: "true"
          semgrep-rules: "p/security-audit"

Part of OSDO

This action is part of the OSDO Framework. Use it standalone or combine with other OSDO actions:

License

Apache-2.0

About

Static Application Security Testing with Semgrep, CodeQL, and language-specific analyzers

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors

Languages