This repository was archived by the owner on Oct 14, 2020. It is now read-only.
File tree Expand file tree Collapse file tree 22 files changed +70
-218
lines changed
declarative-subsequent-scans
imperative-subsequent-scans
persistence-static-report Expand file tree Collapse file tree 22 files changed +70
-218
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ title : " Developer Guide"
3+ path : " docs/developer-guide"
4+ category : " develop"
5+ ---
6+
7+ <!-- end -->
8+
19# Extending secureCodeBox
210
311## Developing the SCB Operator
@@ -86,21 +94,32 @@ cd operator
8694make run
8795```
8896
89- ## How to a New Security Scanner
97+ ## How to add a New Security Scanner
9098
9199### ScanType Definition
100+ > ✍ ** Following...**
92101
93102### Parsing SDK
94103
104+ 1 . Install the dependencies ` npm install `
105+ 2 . Update the parser function here: ` ./parser/parser.js `
106+ 3 . Update the parser tests here: ` ./parser/parser.test.js `
107+ 4 . Run the test suite: ` npm test `
108+
95109## How to Integrate a New Hook
110+ > ✍ ** Following...**
96111
97112### HookType Definition
113+ > ✍ ** Following...**
98114
99115### Hook SDK
116+ > ✍ ** Following...**
100117
101118## Guidelines
119+ > ✍ ** Following...**
102120
103121### Coding Guidelines
122+ > ✍ ** Following...**
104123
105124#### JSON
106125
Original file line number Diff line number Diff line change 1+ ---
2+ title : " User Guide"
3+ path : " docs/user-guide"
4+ category : " use"
5+ ---
6+
7+ <!-- end -->
8+
19# Using the secureCodeBox
210
3- follwing...
11+ > ✍ ** Page under construction. **
Original file line number Diff line number Diff line change 6363EOF
6464```
6565
66- This Scan will used all CascadingRules which are labeled with a "light" intensity.
66+ This Scan will use all CascadingRules which are labeled with a "light" intensity.
6767You can lookup which CascadingRules this selects by running:
6868
6969``` bash
Original file line number Diff line number Diff line change @@ -16,3 +16,4 @@ Installing the Generic WebHook hook will add a ReadOnly Hook to your namespace.
1616``` bash
1717helm upgrade --install gwh ./hooks/generic-webhook/ --set webhookUrl=" http://example.com/my/webhook/target"
1818```
19+ > ✍ This documentation is currently work-in-progress.
Original file line number Diff line number Diff line change 1+ ---
2+ title : " Imperative Scans"
3+ path : " hooks/imperative-subsequent-scans"
4+ category : " hook"
5+ type : " integration"
6+ state : " roadmap"
7+ usecase : " Cascading Scans based imperative Rules."
8+ ---
9+
10+ > 🔧 The implementation is currently work-in-progress and still undergoing major changes. It'll be released here once it has stabilized.
Original file line number Diff line number Diff line change @@ -3,7 +3,7 @@ title: "DefectDojo"
33path : " hooks/persistence-defectdojo"
44category : " hook"
55type : " persistenceProvider"
6- state : " roadmap "
6+ state : " developing "
77usecase : " Publishes all Scan Findings to DefectDojo."
88---
99
@@ -18,7 +18,7 @@ Tools which are supported both by the secureCodeBox and DefectDojo (OWASP ZAP &
1818To learn more about DefectDojo visit [ DefectDojo GitHub] or [ DefectDojo Website] .
1919
2020## Deployment
21- The secureCodeBox core team is working on an integration of DefectDojo. We will keep you informed .
21+ > 🔧 The implementation is currently work-in-progress and under still undergoing major changes. It'll be released here once it has stabilized .
2222
2323
2424[ DefectDojo Website ] : https://www.defectdojo.org/
Original file line number Diff line number Diff line change @@ -10,7 +10,7 @@ usecase: "Publishes all Scan Findings to Elasticsearch."
1010<!-- end -->
1111
1212## About
13- The ElasticSearch persistenceProvider hook saves all findings and reports into the configured ElasticSearch index. This allows for some easy searching and visualization of the findings. To learn more about Elasticsearch visit elastic.io.
13+ The ElasticSearch persistenceProvider hook saves all findings and reports into the configured ElasticSearch index. This allows for some easy searching and visualization of the findings. To learn more about Elasticsearch visit [ elastic.io] .
1414
1515## Deployment
1616
@@ -52,4 +52,6 @@ elasticsearch:
5252kibana :
5353 enabled : true
5454 # image: docker.elastic.co/kibana/kibana-oss
55- ```
55+ ```
56+
57+ [ elastic.io ] : https://www.elastic.co/products/elasticsearch
Original file line number Diff line number Diff line change 1+ ---
2+ title : " Static Report"
3+ path : " hooks/persistence-staticreport"
4+ category : " hook"
5+ type : " persistenceProvider"
6+ state : " developing"
7+ usecase : " Publishes all Scan Findings as HTML Report."
8+ ---
9+
10+ <!-- end -->
11+
12+ ## Deployment
13+
14+ > 🔧 The implementation is currently work-in-progress and still undergoing major changes. It'll be released here once it has stabilized.
15+
Original file line number Diff line number Diff line change @@ -13,4 +13,4 @@ usecase: "Publishes Scan Summary to Slack."
1313
1414Installing the Slack WebHook hook will add a ReadOnly Hook to your namespace.
1515
16- The secureCodeBox core team is working on this, we will keep you informed .
16+ > 🔧 The implementation is currently work-in-progress and still undergoing major changes. It'll be released here once it has stabilized .
Original file line number Diff line number Diff line change @@ -13,4 +13,4 @@ usecase: "Publishes Scan Summary to MS Teams."
1313
1414Installing the Teams WebHook hook will add a ReadOnly Hook to your namespace.
1515
16- The secureCodeBox core team is working on this, we will keep you informed .
16+ > 🔧 The implementation is currently work-in-progress and still undergoing major changes. It'll be released here once it has stabilized .
You can’t perform that action at this time.
0 commit comments