feat: implement comprehensive SAST pipeline with security vulnerabilities#31
Merged
andoniaf merged 1 commit intounicrons:mainfrom Sep 10, 2025
Merged
feat: implement comprehensive SAST pipeline with security vulnerabilities#31andoniaf merged 1 commit intounicrons:mainfrom
andoniaf merged 1 commit intounicrons:mainfrom
Conversation
andoniaf
reviewed
Sep 7, 2025
andoniaf
reviewed
Sep 7, 2025
andoniaf
reviewed
Sep 7, 2025
78d3941 to
929173c
Compare
Collaborator
Author
|
Hey @andoniaf, I've just updated the base branch, could you review it again?
|
andoniaf
approved these changes
Sep 8, 2025
929173c to
ee8cb73
Compare
Implements comprehensive SAST pipeline with CodeQL and Semgrep Community Edition to detect security vulnerabilities in JavaScript applications. CodeQL provides GitHub's official security analysis with deep semantic queries, while Semgrep offers fast pattern-based detection using community security rules. Both tools fail the pipeline when vulnerabilities are detected and upload SARIF results to GitHub Security tab with PR-specific finding links. Added 5 intentional vulnerabilities to simple-app.js for demonstration: - Hardcoded AWS credentials - SQL injection in user lookup - XSS in greeting functionality - Command injection in ping endpoint - Path traversal in file access Uses open source tools with native GitHub Actions support, requiring no licensing or complex setup for workshop environments.
ee8cb73 to
d97372a
Compare
andoniaf
approved these changes
Sep 10, 2025
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🔒 SAST Code Scan Step Implementation
Implements comprehensive SAST pipeline with CodeQL and Semgrep Community Edition to detect security vulnerabilities in JavaScript applications.
CodeQL provides GitHub's official security analysis with deep semantic queries, while Semgrep offers fast pattern-based detection using community security rules. Both tools fail the pipeline when vulnerabilities are detected and upload SARIF results to GitHub Security tab with PR-specific finding links.
🚨 Added 5 intentional vulnerabilities to simple-app.js for demonstration:
🛠️ Tools Implemented
CodeQL provides GitHub's official security analysis with deep semantic queries, while Semgrep offers fast pattern-based detection using community security rules.
✨ Key Features
Uses open source tools with native GitHub Actions support, requiring no licensing or complex setup for workshop environments.