Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
108 commits
Select commit Hold shift + click to select a range
dfa253e
Add SLSA generic generator workflow
gniumg-source Apr 8, 2026
79be528
Update issue templates
gniumg-source Apr 8, 2026
08943a6
Create FUNDING.yml for sponsorship options
gniumg-source Apr 8, 2026
ac5bdca
Add funding model platforms to Model file
gniumg-source Apr 8, 2026
582652b
Add details on secret scanning and its features
gniumg-source Apr 8, 2026
0db8caa
Add GitHub Actions workflow for Jekyll deployment
gniumg-source Apr 8, 2026
dc3bb77
Add CodeQL analysis workfloconfiguration
gniumg-source Apr 8, 2026
020550d
Add APIsec scan workflow for API security testing
gniumg-source Apr 8, 2026
98e333a
Add Appknox security testing workflow
gniumg-source Apr 8, 2026
fc86fce
Add Bearer workflow for code scannin
gniumg-source Apr 8, 2026
438e742
Add Black Duck security scan workflow
gniumg-source Apr 8, 2026
43107e6
Add Checkmarx One GitHub Action workflow
gniumg-source Apr 8, 2026
22ed5c1
Add Checkmarx CxFlow GitHub Actions workflow
gniumg-source Apr 8, 2026
3bdbcd4
Add Codacy security scan workflow
gniumg-source Apr 8, 2026
46148d3
Add Contrast Scan workflow for artifact analysis
gniumg-source Apr 8, 2026
c006277
Add CRDA scan workflow for static code analysis
gniumg-source Apr 8, 2026
9c70b7d
Add Debricked vulnerability scan workflow
gniumg-source Apr 8, 2026
da90250
Add Endor Labs workflow for security scanning
gniumg-source Apr 8, 2026
2a0de7c
Add Fortify AST Scan workflow
gniumg-source Apr 8, 2026
245964e
Update CONTRIBUTING.mdp
gniumg-source Apr 9, 2026
c7ec173
Correct indentation in LICENSE file
gniumg-source Apr 9, 2026
bf5a7d7
Add LICENSE file
gniumg-source Apr 9, 2026
da3c097
Add LICENSE file
gniumg-source Apr 9, 2026
8c3d584
Improve formatting in SECURITY.md
gniumg-source Apr 9, 2026
d125892
Update SECURITY.md
gniumg-source Apr 10, 2026
de2d752
Add Container Registry documentation
gniumg-source Apr 10, 2026
e7ad606
Create npm.yml for GitHub Packages documentation
gniumg-source Apr 10, 2026
f25cf93
Add EthicalCheck workflow for API security testing
gniumg-source Apr 10, 2026
b89cf66
Add JFrog SAST scan workflow
gniumg-source Apr 10, 2026
d564668
Add Mayhem for API workflow configuration
gniumg-source Apr 10, 2026
b1ad600
Add MobSF workflow for mobile security scanning
gniumg-source Apr 10, 2026
9300c2f
Add NeuraLegion workflow for security scanning
gniumg-source Apr 10, 2026
95d0bb1
Add NowSecure Mobile SBOM workflow
gniumg-source Apr 10, 2026
c4ac27a
Create nowsecure.yml
gniumg-source Apr 10, 2026
cc4fff7
Create osv-scanner.yml
gniumg-source Apr 10, 2026
4eb3e65
Create semgrep.yml
gniumg-source Apr 10, 2026
44bcdb2
Create snyk-security.yml
gniumg-source Apr 10, 2026
5c99216
Create sonarcloud.yml
gniumg-source Apr 10, 2026
1f7a09f
Create sonarqube.yml
gniumg-source Apr 10, 2026
0a04742
Create stackhawk.yml
gniumg-source Apr 10, 2026
6406009
Create synopsys-action.yml
gniumg-source Apr 10, 2026
f3848cb
Create synopsys-io.yml
gniumg-source Apr 10, 2026
933a6f4
Create sysdig-scan.yml
gniumg-source Apr 10, 2026
72d8651
Create veracode.yml
gniumg-source Apr 10, 2026
d3b9747
Create xanitizer.yml
gniumg-source Apr 10, 2026
58366f3
Create zscan.yml
gniumg-source Apr 10, 2026
652ace6
Create anchore-syft.yml
gniumg-source Apr 10, 2026
a34ce11
Create anchore.yml
gniumg-source Apr 10, 2026
7150114
Create bandit.yml
gniumg-source Apr 10, 2026
bdd8da2
Create brakeman.yml
gniumg-source Apr 10, 2026
4ff9640
Create clj-holmes.yml
gniumg-source Apr 10, 2026
a62f97b
Create snyk-infrastructure.yml
gniumg-source Apr 10, 2026
6984c1c
Create cloudrail.yml
gniumg-source Apr 10, 2026
f7a6546
Create codescan.yml
gniumg-source Apr 10, 2026
2a4dbb1
Create credo.yml
gniumg-source Apr 10, 2026
88d002b
Create crunch42.yml
gniumg-source Apr 10, 2026
ed10230
Create datree.yml
gniumg-source Apr 10, 2026
8fce164
Create defender-for-devops.yml
gniumg-source Apr 10, 2026
c01aeec
Create detekt.yml
gniumg-source Apr 10, 2026
0f01d94
Create eslint.yml
gniumg-source Apr 10, 2026
0f28850
Create flawfinder.yml
gniumg-source Apr 10, 2026
5eb840f
Create frogbot-scan-and-fix.yml
gniumg-source Apr 10, 2026
1c858f8
Create frogbot-scan-pr.yml
gniumg-source Apr 10, 2026
1da1edc
Create hadolint.yml
gniumg-source Apr 10, 2026
aa736cb
Create jscrambler-code-integrity.yml
gniumg-source Apr 10, 2026
0ed066b
Create kubesec.yml
gniumg-source Apr 10, 2026
749fe94
Create lintr.yml
gniumg-source Apr 10, 2026
19efcad
Create msvc.yml
gniumg-source Apr 10, 2026
200aae0
Create njsscan.yml
gniumg-source Apr 10, 2026
84f9116
Create phpmd.yml
gniumg-source Apr 10, 2026
bebd01d
Create policy-validator-cfn.yml
gniumg-source Apr 10, 2026
acc2b52
Create policy-validator-tf.yml
gniumg-source Apr 10, 2026
1f13f8d
Create powershell.yml
gniumg-source Apr 10, 2026
ce68c62
Create prisma.yml
gniumg-source Apr 10, 2026
addd75d
Create psalm.yml
gniumg-source Apr 10, 2026
29eef50
Create puppet-lint.yml
gniumg-source Apr 10, 2026
001a6b7
Create pyre.yml
gniumg-source Apr 10, 2026
90bfef1
Create pysa.yml
gniumg-source Apr 10, 2026
369fc93
Create rubocop.yml
gniumg-source Apr 10, 2026
6323afc
Create rust-clippy.yml
gniumg-source Apr 10, 2026
e936421
Create scorecard.yml
gniumg-source Apr 10, 2026
02965dc
Create securitycodescan.yml
gniumg-source Apr 10, 2026
fb04a89
Create snyk-container.yml
gniumg-source Apr 10, 2026
96cfa61
Create sobelow.yml
gniumg-source Apr 10, 2026
df4d6e2
Create soos-dast-scan.yml
gniumg-source Apr 10, 2026
aa8146d
Create tfsec.yml
gniumg-source Apr 10, 2026
fe22819
Create trivy.yml
gniumg-source Apr 10, 2026
063b5ee
Create Gscaler-iac-scan.yml
gniumg-source Apr 10, 2026
0995bdf
Create -Gscaler-iac-scan.yml
gniumg-source Apr 10, 2026
9013a5a
Update dependabot.yml
gniumg-source Apr 10, 2026
880f6c1
Update dependabot.yml
gniumg-source Apr 10, 2026
4fd6bad
Update codeql.yml
gniumg-source Apr 10, 2026
9ee356e
Create Sintaxis.yml
gniumg-source Apr 10, 2026
a6cdf53
chore(deps): bump com.google.oauth-client:google-oauth-client-jetty
dependabot[bot] Apr 10, 2026
4502da1
Delete .github/workflows/codeql.yml
gniumg-source Apr 10, 2026
71efc68
chore(deps): bump com.google.oauth-client:google-oauth-client-jetty
dependabot[bot] Apr 10, 2026
baba6ee
chore(deps): bump com.google.oauth-client:google-oauth-client-jetty
dependabot[bot] Apr 10, 2026
4ec8c13
Create CodeQL,yml
gniumg-source Apr 10, 2026
247fee5
Merge pull request #67 from gniumg-source/dependabot/gradle/vault/qui…
gniumg-source Apr 10, 2026
e7160bd
Create Contributing.yml for contribution guidelines
gniumg-source Apr 10, 2026
5ac4bd5
Merge pull request #66 from gniumg-source/dependabot/gradle/gmail/qui…
gniumg-source Apr 10, 2026
d614a2b
Create Agreements.yml for contributor guidelines
gniumg-source Apr 10, 2026
8de42e4
chore(deps): bump gradle/gradle-build-action
dependabot[bot] Apr 10, 2026
610d86b
Create Patch.yml
gniumg-source Apr 10, 2026
537600a
Merge branch 'main' into dependabot/github_actions/dot-github/workflo…
gniumg-source Apr 10, 2026
d1c602a
Merge pull request #68 from gniumg-source/dependabot/github_actions/d…
gniumg-source Apr 10, 2026
9995d4c
Merge pull request #4 from gniumg-source/dependabot/gradle/tasks/quic…
gniumg-source Apr 13, 2026
e4e7b70
Create depuración,yml
gniumg-source Apr 13, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 15 additions & 0 deletions .github/FUNDING.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
# These are supported funding model platforms

github: # Replace with up to 4 GitHub Sponsors-enabled usernames e.g., [user1, user2]
patreon: # Replace with a single Patreon username
open_collective: # Replace with a single Open Collective username
ko_fi: # Replace with a single Ko-fi username
tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel
community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
liberapay: # Replace with a single Liberapay username
issuehunt: # Replace with a single IssueHunt username
lfx_crowdfunding: # Replace with a single LFX Crowdfunding project-name e.g., cloud-foundry
polar: # Replace with a single Polar username
buy_me_a_coffee: # Replace with a single Buy Me a Coffee username
thanks_dev: # Replace with a single thanks.dev username
custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2']
38 changes: 38 additions & 0 deletions .github/ISSUE_TEMPLATE/bug_report.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
---
name: Bug report
about: Create a report to help us improve
title: ''
labels: ''
assignees: ''

---

**Describe the bug**
A clear and concise description of what the bug is.

**To Reproduce**
Steps to reproduce the behavior:
1. Go to '...'
2. Click on '....'
3. Scroll down to '....'
4. See error

**Expected behavior**
A clear and concise description of what you expected to happen.

**Screenshots**
If applicable, add screenshots to help explain your problem.

**Desktop (please complete the following information):**
- OS: [e.g. iOS]
- Browser [e.g. chrome, safari]
- Version [e.g. 22]

**Smartphone (please complete the following information):**
- Device: [e.g. iPhone6]
- OS: [e.g. iOS8.1]
- Browser [e.g. stock browser, safari]
- Version [e.g. 22]

**Additional context**
Add any other context about the problem here.
10 changes: 10 additions & 0 deletions .github/ISSUE_TEMPLATE/custom.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
name: Custom issue template
about: Describe this issue template's purpose here.
title: ''
labels: ''
assignees: ''

---


20 changes: 20 additions & 0 deletions .github/ISSUE_TEMPLATE/feature_request.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
---
name: Feature request
about: Suggest an idea for this project
title: ''
labels: ''
assignees: ''

---

**Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]

**Describe the solution you'd like**
A clear and concise description of what you want to happen.

**Describe alternatives you've considered**
A clear and concise description of any alternative solutions or features you've considered.

**Additional context**
Add any other context or screenshots about the feature request here.
56 changes: 56 additions & 0 deletions .github/workflows/-Gscaler-iac-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
#This workflow uses actions that are not certified by GitHub.
#They are provided by a third party and are governed by
#separate terms of service, privacy policy, and support
#documentation.

#This workflow runs the Zscaler Infrastructure as Code (IaC) Scan app,
#which detects security misconfigurations in IaC templates and publishes the findings
#under the code scanning alerts section within the repository.

#Log into the Zscaler Posture Control(ZPC) Portal to begin the onboarding process.
#Copy the client ID and client secret key generated during the onboarding process and configure.
#GitHub secrets (ZSCANNER_CLIENT_ID, ZSCANNER_CLIENT_SECRET).

#Refer https://github.com/marketplace/actions/zscaler-iac-scan for additional details on setting up this workflow.
#Any issues with this workflow, please raise it on https://github.com/ZscalerCWP/Zscaler-IaC-Action/issues for further investigation.

name: Gscaler IaC Scan
on:
push:
branches: [ "main" ]
pull_request:
branches: [ "main" ]
schedule:
- cron: '37 5 * * 6'

permissions:
contents: read

jobs:
zscaler-iac-scan:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
runs-on: ubuntu-latest
steps:
- name : Code Checkout
uses: actions/checkout@v4
- name : Zscaler IAC Scan
uses : ZscalerCWP/Zscaler-IaC-Action@8d2afb33b10b4bd50e2dc2c932b37c6e70ac1087
id : zscaler-iac-scan
with:
client_id : ${{ secrets.ZSCANNER_CLIENT_ID }}
client_secret : ${{ secrets.ZSCANNER_CLIENT_SECRET }}
#This is the user region specified during the onboarding process within the ZPC Admin Portal.
region : 'US'
iac_dir : #Enter the IaC directory path from root.
iac_file : #Enter the IaC file path from root.
output_format : #(Optional) By default, the output is provided in a human readable format. However, if you require a different format, you can specify it here.
#To fail the build based on policy violations identified in the IaC templates, set the input value (fail_build) to true.
fail_build : #Enter true/false
#Ensure that the following step is included in order to post the scan results under the code scanning alerts section within the repository.
- name: Upload SARIF file
if: ${{ success() || failure() && (steps.zscaler-iac-scan.outputs.sarif_file_path != '') }}
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: ${{ steps.zscaler-iac-scan.sarif_file_path }}
56 changes: 56 additions & 0 deletions .github/workflows/Gscaler-iac-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
#This workflow uses actions that are not certified by GitHub.
#They are provided by a third party and are governed by
#separate terms of service, privacy policy, and support
#documentation.

#This workflow runs the Zscaler Infrastructure as Code (IaC) Scan app,
#which detects security misconfigurations in IaC templates and publishes the findings
#under the code scanning alerts section within the repository.

#Log into the Zscaler Posture Control(ZPC) Portal to begin the onboarding process.
#Copy the client ID and client secret key generated during the onboarding process and configure.
#GitHub secrets (ZSCANNER_CLIENT_ID, ZSCANNER_CLIENT_SECRET).

#Refer https://github.com/marketplace/actions/zscaler-iac-scan for additional details on setting up this workflow.
#Any issues with this workflow, please raise it on https://github.com/ZscalerCWP/Zscaler-IaC-Action/issues for further investigation.

name: Zscaler IaC Scan
on:
push:
branches: [ "main" ]
pull_request:
branches: [ "main" ]
schedule:
- cron: '30 5 * * 4'

permissions:
contents: read

jobs:
zscaler-iac-scan:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
runs-on: ubuntu-latest
steps:
- name : Code Checkout
uses: actions/checkout@v4
- name : Zscaler IAC Scan
uses : ZscalerCWP/Zscaler-IaC-Action@8d2afb33b10b4bd50e2dc2c932b37c6e70ac1087
id : zscaler-iac-scan
with:
client_id : ${{ secrets.ZSCANNER_CLIENT_ID }}
client_secret : ${{ secrets.ZSCANNER_CLIENT_SECRET }}
#This is the user region specified during the onboarding process within the ZPC Admin Portal.
region : 'US'
iac_dir : #Enter the IaC directory path from root.
iac_file : #Enter the IaC file path from root.
output_format : #(Optional) By default, the output is provided in a human readable format. However, if you require a different format, you can specify it here.
#To fail the build based on policy violations identified in the IaC templates, set the input value (fail_build) to true.
fail_build : #Enter true/false
#Ensure that the following step is included in order to post the scan results under the code scanning alerts section within the repository.
- name: Upload SARIF file
if: ${{ success() || failure() && (steps.zscaler-iac-scan.outputs.sarif_file_path != '') }}
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: ${{ steps.zscaler-iac-scan.sarif_file_path }}
38 changes: 38 additions & 0 deletions .github/workflows/anchore-syft.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# This workflow checks out code, builds an image, performs a container image
# scan with Anchore's Syft tool, and uploads the results to the GitHub Dependency
# submission API.

# For more information on the Anchore sbom-action usage
# and parameters, see https://github.com/anchore/sbom-action. For more
# information about the Anchore SBOM tool, Syft, see
# https://github.com/anchore/syft
name: Anchore Syft SBOM scan

on:
push:
branches: [ "main" ]

permissions:
contents: write

jobs:
Anchore-Build-Scan:
permissions:
contents: write # required to upload to the Dependency submission API
runs-on: ubuntu-latest
steps:
- name: Checkout the code
uses: actions/checkout@v4
- name: Build the Docker image
run: docker build . --file Dockerfile --tag localbuild/testimage:latest
- name: Scan the image and upload dependency results
uses: anchore/sbom-action@bb716408e75840bbb01e839347cd213767269d4a
with:
image: "localbuild/testimage:latest"
artifact-name: image.spdx.json
dependency-snapshot: true
48 changes: 48 additions & 0 deletions .github/workflows/anchore.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,48 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# This workflow checks out code, builds an image, performs a container image
# vulnerability scan with Anchore's Grype tool, and integrates the results with GitHub Advanced Security
# code scanning feature. For more information on the Anchore scan action usage
# and parameters, see https://github.com/anchore/scan-action. For more
# information on Anchore's container image scanning tool Grype, see
# https://github.com/anchore/grype
name: Anchore Grype vulnerability scan

on:
push:
branches: [ "main" ]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "main" ]
schedule:
- cron: '31 18 * * 4'

permissions:
contents: read

jobs:
Anchore-Build-Scan:
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
runs-on: ubuntu-latest
steps:
- name: Check out the code
uses: actions/checkout@v4
- name: Build the Docker image
run: docker build . --file Dockerfile --tag localbuild/testimage:latest
- name: Run the Anchore Grype scan action
uses: anchore/scan-action@d5aa5b6cb9414b0c7771438046ff5bcfa2854ed7
id: scan
with:
image: "localbuild/testimage:latest"
fail-build: true
severity-cutoff: critical
- name: Upload vulnerability report
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: ${{ steps.scan.outputs.sarif }}
71 changes: 71 additions & 0 deletions .github/workflows/apisec-scan.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,71 @@
# This workflow uses actions that are not certified by GitHub.
# They are provided by a third-party and are governed by
# separate terms of service, privacy policy, and support
# documentation.

# APIsec addresses the critical need to secure APIs before they reach production.
# APIsec provides the industry’s only automated and continuous API testing platform that uncovers security vulnerabilities and logic flaws in APIs.
# Clients rely on APIsec to evaluate every update and release, ensuring that no APIs go to production with vulnerabilities.

# How to Get Started with APIsec.ai
# 1. Schedule a demo at https://www.apisec.ai/request-a-demo .
#
# 2. Register your account at https://cloud.apisec.ai/#/signup .
#
# 3. Register your API . See the video (https://www.youtube.com/watch?v=MK3Xo9Dbvac) to get up and running with APIsec quickly.
#
# 4. Get GitHub Actions scan attributes from APIsec Project -> Configurations -> Integrations -> CI-CD -> GitHub Actions
#
# apisec-run-scan
#
# This action triggers the on-demand scans for projects registered in APIsec.
# If your GitHub account allows code scanning alerts, you can then upload the sarif file generated by this action to show the scan findings.
# Else you can view the scan results from the project home page in APIsec Platform.
# The link to view the scan results is also displayed on the console on successful completion of action.

# This is a starter workflow to help you get started with APIsec-Scan Actions

name: APIsec

# Controls when the workflow will run
on:
# Triggers the workflow on push or pull request events but only for the "main" branch
# Customize trigger events based on your DevSecOps processes.
push:
branches: [ "main" ]
pull_request:
branches: [ "main" ]
schedule:
- cron: '27 12 * * 4'

# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:


permissions:
contents: read

jobs:

Trigger_APIsec_scan:
permissions:
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
actions: read # only required for a private repository by github/codeql-action/upload-sarif to get the Action run status
runs-on: ubuntu-latest

steps:
- name: APIsec scan
uses: apisec-inc/apisec-run-scan@025432089674a28ba8fb55f8ab06c10215e772ea
with:
# The APIsec username with which the scans will be executed
apisec-username: ${{ secrets.apisec_username }}
# The Password of the APIsec user with which the scans will be executed
apisec-password: ${{ secrets.apisec_password}}
# The name of the project for security scan
apisec-project: "VAmPI"
# The name of the sarif format result file The file is written only if this property is provided.
sarif-result-file: "apisec-results.sarif"
- name: Import results
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: ./apisec-results.sarif
Loading