-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Plugin hosting request for traceable-plugin #3977
Comments
Hello from your friendly Jenkins Hosting Checker It appears you have some issues with your hosting request. Please see the list below and correct all issues marked Required. Your hosting request will not be approved until these issues are corrected. Issues marked with Warning or Info are just recommendations and will not stall the hosting process.
You can re-trigger a check by editing your hosting request or by commenting |
Security audit, information and commands The security team is auditing all the hosting requests, to ensure a better security by default. This message informs you that a Jenkins Security Scan was triggered on your repository. CommandsThe bot will parse all comments, and it will check if any line start with a command. Security team only:
Anyone:
Only one command can be requested per comment. (automatically generated message, version: 1.28.6) |
Hello from your friendly Jenkins Hosting Checker It looks like you have everything in order for your hosting request. A member of the Jenkins hosting team will check over things that I am not able to check(code review, README content, etc) and process the request as quickly as possible. Thank you for your patience. Hosting team members can host this request with |
The Jenkins Security Scan discovered 7 finding(s) 🔍. Please follow the instructions below for every identified issues:
After addressing the findings through one of the above methods:
Jenkins: Plaintext password storageYou can find detailed information about this finding here. TraceableASTGenerateReportAction.java#30
TraceableASTGenerateReportAction.java#27
Jenkins: Generally unsafe method callsYou can find detailed information about this finding here. TraceableASTGenerateReportAction.java#63
TraceableASTInitAndRunStepBuilder.java#469
TraceableASTInitStepBuilder.java#430
TraceableASTRunStepBuilder.java#90
TraceableApiInspectorStepBuilder.java#104
|
All of
look like real findings: User input can be used as commands. This plugin also doesn't seem to support distributed builds, but haven't looked closely enough to be sure. I recommend this not be hosted in the current state unless thoroughly reviewed. |
@daniel-beck do you know the reason for the following check failing? The following usernames in 'GitHub Users to Authorize as Committers' are not valid GitHub usernames or are Organizations: dhruv-singhal-github samarth-gupta-traceable Both usernames are valid usernames when you search on github. |
Obsolete since Tim edited your comment, see #3977 (comment). |
/request-security-scan |
The Jenkins Security Scan discovered 1 finding(s) 🔍. Please follow the instructions below for every identified issues:
After addressing the findings through one of the above methods:
Jenkins: Plaintext password storageYou can find detailed information about this finding here. TraceableASTGenerateReportAction.java#31
|
@daniel-beck This seems a false positive because this is not the actual cert value but the file name of the cert |
Yep, that one's fine. Suppress the finding, or don't if there are no plans to use the security scan in your repo. FWIW it's unclear to me why the Replacing |
@daniel-beck how do you suggest we solve this, since we do need to run scripts based on parameters from users. |
@dhruv-singhal-github First, determine whether they need to run on the controller. Tools generally run on the node that performs other build steps as well, typically an agent. https://www.jenkins.io/redirect/distributed-builds/ If you're absolutely sure it needs to happen on the controller (and not just out of convenience), try the same or similar script without Note that most scripts have a shebang line and this one does not, and those that have it hardcode a path to |
/request-security-scan |
The Jenkins Security Scan discovered 6 finding(s) 🔍. Please follow the instructions below for every identified issues:
After addressing the findings through one of the above methods:
Remoting: Unsafe CallableYou can find detailed information about this finding here. ApiInspector.java#50
DownloadTraceableCliBinary.java#54
GenerateReport.java#51
RunScript.java#50
Jenkins: Plaintext password storageYou can find detailed information about this finding here. TraceableASTGenerateReportAction.java#22
TraceableApiInspectorStepBuilder.java#26
|
/request-security-scan |
The Jenkins Security Scan did not find anything dangerous with your plugin, congratulations! 🎉 💡 The Security team recommends that you are setting up the scan in your repository by following our guide. |
@daniel-beck have made the changes of running the commands on agent rather than on controller, can you please have a look. Thank You! |
|
@mawinter69 made the changes, can you please review. Thank You. |
The names you used in the |
Done. |
/hosting re-check |
Hello from your friendly Jenkins Hosting Checker It looks like you have everything in order for your hosting request. A member of the Jenkins hosting team will check over things that I am not able to check(code review, README content, etc) and process the request as quickly as possible. Thank you for your patience. Hosting team members can host this request with |
/hosting re-check |
Hello from your friendly Jenkins Hosting Checker It looks like you have everything in order for your hosting request. A member of the Jenkins hosting team will check over things that I am not able to check(code review, README content, etc) and process the request as quickly as possible. Thank you for your patience. Hosting team members can host this request with |
@alecharp can you explain the first and the last point.
|
@alecharp made the changes for all the points, just these two are remaining. |
@alecharp Any updates on this ? |
@alecharp can we host this plugin if the final iteration looks good? |
Repository URL
https://github.com/Traceableai/traceable-xast-jenkins-plugin
New Repository Name
traceable-plugin
Description
This is a plugin by Traceable AI that helps in API Security Testing by finding vulnerabilities in very early stages, giving developers and Product security engineers more time and context to prioritize mitigation of vulnerabilities and build resilient systems by scanning APIs for vulnerabilities by changing the data in the existing API specifications as required to introduce vulnerabilities.
GitHub users to have commit permission
@dhruv-singhal-github
@samarth-gupta-traceable
Jenkins project users to have release permission
dhruv_singhal
traceableai
Issue tracker
Jira
The text was updated successfully, but these errors were encountered: