All Projects → ZupIT → horusec-engine

ZupIT / horusec-engine

Licence: Apache-2.0 license
Horusec analysis engine

Programming Languages

go
31211 projects - #10 most used programming language
Makefile
30231 projects

Projects that are alternatives of or similar to horusec-engine

Horusec
Horusec is an open source tool that improves identification of vulnerabilities in your project with just one command.
Stars: ✭ 311 (+1627.78%)
Mutual labels:  ci, cd, netcore
Scripts
Scripts for use on Codeship Basic
Stars: ✭ 211 (+1072.22%)
Mutual labels:  ci, cd
Jenkins Rest
Java client, built on top of jclouds, for working with Jenkins REST API
Stars: ✭ 201 (+1016.67%)
Mutual labels:  ci, cd
Flagsmith Api
Feature flagging and remote config service. Host yourself or use our hosted version at https://www.flagsmith.com/
Stars: ✭ 223 (+1138.89%)
Mutual labels:  ci, cd
Solo Ci
A lightweight CI/CD tool powered by Golang
Stars: ✭ 168 (+833.33%)
Mutual labels:  ci, cd
Nevergreen
🐤 A build monitor with attitude
Stars: ✭ 170 (+844.44%)
Mutual labels:  ci, cd
Opensa
资产管理、资产采集、灰度发布、反向代理、批量任务、任务编排、计划任务、日志审计、权限管理、角色管理、部门管理、运维自动化
Stars: ✭ 220 (+1122.22%)
Mutual labels:  ci, cd
Gitlab Ci Local
Tired of pushing to test your .gitlab-ci.yml?
Stars: ✭ 134 (+644.44%)
Mutual labels:  ci, cd
Opendevops
CODO是一款为用户提供企业多混合云、一站式DevOps、自动化运维、完全开源的云管理平台、自动化运维平台
Stars: ✭ 2,990 (+16511.11%)
Mutual labels:  ci, cd
Rok8s Scripts
Opinionated scripts for managing application deployment lifecycle in Kubernetes
Stars: ✭ 248 (+1277.78%)
Mutual labels:  ci, cd
Webhookd
A very simple webhook server launching shell scripts.
Stars: ✭ 250 (+1288.89%)
Mutual labels:  ci, cd
Symfony Bootstrapped
⚡️ Symfony with tools
Stars: ✭ 160 (+788.89%)
Mutual labels:  ci, cd
Action Docker Layer Caching
🐳 Enable Docker layer caching in GitHub Actions
Stars: ✭ 160 (+788.89%)
Mutual labels:  ci, cd
Pypyr
pypyr task-runner cli & api for automation pipelines. Automate anything by combining commands, different scripts in different languages & applications into one pipeline process.
Stars: ✭ 173 (+861.11%)
Mutual labels:  ci, cd
Goploy
Deploy, CI/CD, Xterm, APP monitor, Crontab Manager.
Stars: ✭ 147 (+716.67%)
Mutual labels:  ci, cd
Rocket
Automated software delivery as fast and easy as possible 🚀
Stars: ✭ 217 (+1105.56%)
Mutual labels:  ci, cd
cli-template
⚗ The most advanced CLI template on earth! Featuring automatic releases, website generation and a custom CI-System out of the box.
Stars: ✭ 43 (+138.89%)
Mutual labels:  ci, cd
Kubectl
A Github action for kubectl, the Kubernetes CLI
Stars: ✭ 128 (+611.11%)
Mutual labels:  ci, cd
Gradle Nexus Staging Plugin
Automatize releasing Gradle projects to Maven Central.
Stars: ✭ 132 (+633.33%)
Mutual labels:  ci, cd
Ansible Role Awx
Ansible Role - AWX
Stars: ✭ 228 (+1166.67%)
Mutual labels:  ci, cd

logo_header

Horusec Engine

Table of contents

1. About

2. Usage

2.1. Why does this engine help me?

2.2. Examples

3. Documentation

4. Issues

5. Contributing

6. License

7. Community

About

This repository contains the standalone SAST engine used by Horusec. By now we only have a pattern matching rule implementation, but a semantic analysis is already is being planned.

This is an internal repository of the Horusec CLI, so we don't guarantee compatibility between versions.

What is a SAST tool?

A Static Application Security Testing tool is an automated scanner for security issues in your source code. The main goal is to identify, as soon as possible in your development lifecycle, any possible threat to your infrastructure and your user's data. SAST tools don't actually find vulnerabilities because the tool never executes the program being analyzed, therefore, you still have to keep testing your applications with more traditional pen testing and any other tests that you can execute.

Usage

To use this implementation will be needed to create a new engine instance informing the goroutines pool size and the slice of the extensions that should be analyzed. After the analysis is finished, a slice of findings will be returned.

1. Goroutines Pool

The pool size informed during instantiation will directly affect memory usage and analysis time. The larger the pool, the shorter the analysis time, but the greater the amount of memory required.

2. Rule

Contains all the data needed to identify and report a vulnerability. All rules are defined by a generic interface with a Run function. The idea is that we have several specific implementations of rules, like the one we currently have in the text package, but each one with it own specific strategy.

3. Finding

It contains all the possible vulnerabilities found after the analysis, it also has the necessary data to identify and treat the vulnerability.

Example

    eng := engine.NewEngine(10, ".java")

    rules := []engine.Rule{
        &text.Rule{
            Metadata: engine.Metadata{
                ID:          "HORUSEC-EXAMPLE-1",
                Name:        "Hello World",
                Description: "This is a example of the engine usage",
                Severity:    "HIGH",
                Confidence:  "HIGH",
            },
            Type: text.OrMatch,
            Expressions: []*regexp.Regexp{
                regexp.MustCompile(`System\.out\.println\("Hello World"\);`),
             },
        },
        ...
    }

    findings, err := eng.Run(context.Background(), "path-to-analyze", rules...)
    if err != nil {
        return err
    }

    for _, finding := range findings {
        // do something
    }

Documentation

For more information about Horusec, please check out the documentation.

Issues

To open or track an issue for this project, in order to better coordinate your discussions, we recommend that you use the Issues tab in the main Horusec repository.

Contributing

If you want to contribute to this repository, access our Contributing Guide.

Developer Certificate of Origin - DCO

This is a security layer for the project and for the developers. It is mandatory.

Follow one of these two methods to add DCO to your commits:

1. Command line Follow the steps: Step 1: Configure your local git environment adding the same name and e-mail configured at your GitHub account. It helps to sign commits manually during reviews and suggestions.

git config --global user.name “Name”
git config --global user.email “[email protected]

Step 2: Add the Signed-off-by line with the '-s' flag in the git commit command:

$ git commit -s -m "This is my commit message"

2. GitHub website You can also manually sign your commits during GitHub reviews and suggestions, follow the steps below:

Step 1: When the commit changes box opens, manually type or paste your signature in the comment box, see the example:

Signed-off-by: Name < e-mail address >

For this method, your name and e-mail must be the same registered on your GitHub account.

License

Apache License 2.0.

Community

Do you have any question about Horusec? Let's chat in our forum.

This project exists thanks to all the contributors. You rock! ❤️🚀

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].