Skip to content

Commit e609ce4

Browse files
Adds SECURITY.md and scanning workflow (#223)
This adds SECURITY.md and a scanning workflow, using Trivy. In particular, this clarifies what we use to scan for vulnerabilities (Trivy, not anything else), and the only channel likely to be responded to on a significant issue (zipkin-admin email, not advisories as people ignored them). This is the same approach as approved and merged in openzipkin/zipkin-reporter-java#267 --------- Signed-off-by: Adrian Cole <[email protected]>
1 parent 406526f commit e609ce4

File tree

2 files changed

+63
-0
lines changed

2 files changed

+63
-0
lines changed

.github/workflows/security.yml

+50
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
name: security
3+
4+
# We don't scan documentation-only commits.
5+
on: # yamllint disable-line rule:truthy
6+
push: # non-tagged pushes to master
7+
branches:
8+
- master
9+
tags-ignore:
10+
- '*'
11+
paths-ignore:
12+
- '**/*.md'
13+
pull_request: # pull requests targeted at the master branch.
14+
branches:
15+
- master
16+
paths-ignore:
17+
- '**/*.md'
18+
19+
jobs:
20+
security:
21+
name: security
22+
runs-on: ubuntu-22.04 # newest available distribution, aka jellyfish
23+
steps:
24+
- name: Checkout Repository
25+
uses: actions/checkout@v4
26+
- uses: actions/cache@v4
27+
name: Cache Trivy Database
28+
with:
29+
path: .trivy
30+
key: ${{ runner.os }}-trivy
31+
restore-keys: ${{ runner.os }}-trivy
32+
- name: Run Trivy vulnerability and secret scanner
33+
uses: aquasecurity/trivy-action@master
34+
id: trivy
35+
with:
36+
scan-type: 'fs'
37+
scan-ref: '.' # scan the entire repository
38+
scanners: vuln,secret
39+
exit-code: '1'
40+
severity: HIGH,CRITICAL
41+
output: trivy-report.md
42+
cache-dir: .trivy
43+
- name: Set Summary
44+
shell: bash
45+
if: ${{ failure() && steps.trivy.conclusion == 'failure' }}
46+
# Add the Trivy report to the summary
47+
#
48+
# Note: This will cause a workflow error if trivy-report.md > the step
49+
# limit 1MiB. If this was due to too many CVEs, consider fixing them ;)
50+
run: cat trivy-report.md >> $GITHUB_STEP_SUMMARY

SECURITY.md

+13
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
# OpenZipkin Security Process
2+
3+
This document outlines the process for handling security concerns in OpenZipkin projects.
4+
5+
Any vulnerability or misconfiguration detected in our [security workflow](.github/workflows/security.yml)
6+
should be addressed as a normal pull request.
7+
8+
OpenZipkin is a volunteer community and does not have a dedicated security team. There may be
9+
periods where no volunteer is able to address a security concern. There is no SLA or warranty
10+
offered by volunteers. If you are a security researcher, please consider this before escalating.
11+
12+
For security concerns that are sensitive or otherwise outside the scope of public issues, please
13+

0 commit comments

Comments
 (0)