Skip to content

feat(redteam): v2 -- aggressive Xen CVE exploitation strategies, XSA … #9

feat(redteam): v2 -- aggressive Xen CVE exploitation strategies, XSA …

feat(redteam): v2 -- aggressive Xen CVE exploitation strategies, XSA … #9

name: Build Redteam Image
on:
push:
branches: [main]
paths:
- 'redteam/**'
workflow_dispatch:
env:
REGISTRY: ghcr.io
jobs:
build:
runs-on: ubuntu-latest
permissions:
contents: read
packages: write
steps:
- uses: actions/checkout@v4
- name: Set up Go
uses: actions/setup-go@v5
with:
go-version: '1.22'
- name: Build redteam agent
run: |
cd redteam
CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -o redteam-agent .
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Login to GitHub Container Registry
uses: docker/login-action@v3
with:
registry: ${{ env.REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}
- name: Collect seed files
run: |
mkdir -p redteam/seeds
cp scripts/test-*.sh redteam/seeds/
- name: Build and push redteam image
uses: docker/build-push-action@v6
with:
context: redteam
file: redteam/Dockerfile
push: true
tags: |
${{ env.REGISTRY }}/codewiresh/redteam:latest
${{ env.REGISTRY }}/codewiresh/redteam:${{ github.sha }}
cache-from: type=gha
cache-to: type=gha,mode=max