Skip to content

Commit 94c93d7

Browse files
authored
Merge pull request #9 from ArturSnyk/sarif/checking_scanning_flow
Sarif/checking scanning flow
2 parents 9300e9a + 6386cc1 commit 94c93d7

File tree

5 files changed

+3060
-2
lines changed

5 files changed

+3060
-2
lines changed

.github/scan.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
name: Testing security scan - using sarif
2+
on: [push]
3+
4+
jobs:
5+
build:
6+
name: sarif testing action
7+
runs-on: ubuntu-latest
8+
steps:
9+
- uses: actions/checkout@v1
10+
- name: Upload SARIF
11+
uses: github/codeql-action/upload-sarif@v1
12+
with:
13+
sarif_file: sarif/results.sarif

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,3 +6,4 @@ node_modules
66
sass
77
config.rb
88
npm-debug.log
9+
.dccache

Dockerfile

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
1-
FROM node:6-stretch
1+
# FROM node:6-stretch
2+
FROM node:14.1.0
23

34
RUN mkdir /usr/src/goof
45
RUN mkdir /tmp/extracted_files

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ npm run cleanup
4545
This app uses npm dependencies holding known vulnerabilities.
4646

4747
Here are the exploitable vulnerable packages:
48-
- [Mongoose - Buffer Memory Exposure](https://snyk.io/vuln/npm:mongoose:20160116)
48+
- [Mongoose - Buffer Memory Exposure](https://snyk.io/vuln/npm:mongoose:20160116) - requires a version <= Node.js 8. For the exploit demo purposes, one can update the Dockerfile `node` base image to use `FROM node:6-stretch`.
4949
- [st - Directory Traversal](https://snyk.io/vuln/npm:st:20140206)
5050
- [ms - ReDoS](https://snyk.io/vuln/npm:ms:20151024)
5151
- [marked - XSS](https://snyk.io/vuln/npm:marked:20150520)

0 commit comments

Comments
 (0)