Skip to content
This repository was archived by the owner on Dec 30, 2025. It is now read-only.

Commit bfdcb6c

Browse files
committed
refactor: remove configuration security analysis job
- Remove Docker Compose and Containerfile security analysis - Configuration security checks are redundant with existing tools: * Docker Compose validation already in CI workflow * Containerfile linting with Hadolint in CI workflow * Trivy scanning covers container security vulnerabilities - Simplify security workflow to focus on core security scanning - Maintain comprehensive security coverage through existing CI checks
1 parent 6a6c419 commit bfdcb6c

File tree

1 file changed

+0
-77
lines changed

1 file changed

+0
-77
lines changed

.github/workflows/security.yml

Lines changed: 0 additions & 77 deletions
Original file line numberDiff line numberDiff line change
@@ -225,80 +225,3 @@ jobs:
225225
226226
echo ""
227227
} >> "$GITHUB_STEP_SUMMARY"
228-
config:
229-
name: Configuration Security
230-
runs-on: ubuntu-latest
231-
needs: [changes]
232-
if: (needs.changes.outputs.yaml == 'true' || github.event_name == 'workflow_dispatch')
233-
permissions:
234-
contents: read
235-
security-events: write
236-
steps:
237-
- name: Checkout
238-
uses: actions/checkout@v4
239-
- name: Configuration Security Analysis
240-
run: |
241-
echo "## 🔧 Configuration Security Analysis"
242-
echo ""
243-
244-
# Analyze Docker Compose file
245-
if [ -f "compose.yaml" ]; then
246-
echo "### Docker Compose Security Analysis"
247-
248-
# Check for privileged mode
249-
if grep -n "privileged: true" compose.yaml; then
250-
echo "⚠️ Privileged containers detected"
251-
else
252-
echo "✅ No privileged containers"
253-
fi
254-
255-
# Check for host network mode
256-
if grep -n "network_mode: host" compose.yaml; then
257-
echo "⚠️ Host network mode detected"
258-
else
259-
echo "✅ No host network mode"
260-
fi
261-
262-
# Check for exposed ports
263-
EXPOSED_PORTS=$(grep -n "ports:" -A 10 compose.yaml | grep -o "[0-9]*:[0-9]*" || echo "")
264-
if [ -n "$EXPOSED_PORTS" ]; then
265-
echo "**Exposed ports:** $EXPOSED_PORTS"
266-
echo "✅ Review port exposure for security"
267-
fi
268-
269-
# Check for environment variables
270-
if grep -n "environment:" -A 20 compose.yaml | grep -i "password\|secret\|key\|token" | grep -v "#.*password\|#.*secret"; then
271-
echo "⚠️ Potential secrets in environment variables"
272-
else
273-
echo "✅ No obvious secrets in environment"
274-
fi
275-
276-
echo ""
277-
fi
278-
279-
# Analyze Containerfiles
280-
for containerfile in $(find . -name "Containerfile" -o -name "Dockerfile"); do
281-
echo "### Containerfile Security Analysis: $containerfile"
282-
283-
# Check for root user
284-
if grep -n "USER root" "$containerfile"; then
285-
echo "⚠️ Running as root user"
286-
else
287-
echo "✅ Not explicitly running as root"
288-
fi
289-
290-
# Check for COPY/ADD with sensitive paths
291-
if grep -n "COPY\|ADD" "$containerfile" | grep -E "/etc|/root|/home"; then
292-
echo "⚠️ Copying from sensitive system paths"
293-
else
294-
echo "✅ No sensitive path copies detected"
295-
fi
296-
297-
# Check for exposed ports
298-
if grep -n "EXPOSE" "$containerfile"; then
299-
echo "**Exposed ports:** $(grep -n "EXPOSE" "$containerfile" | sed 's/.*EXPOSE //')"
300-
fi
301-
302-
echo ""
303-
done
304-
} >> "$GITHUB_STEP_SUMMARY"

0 commit comments

Comments
 (0)