GitHub Action
OpalOPC Scan Action
This action runs a OpalOPC vulnerability scan against a target server. On completion, an HTML and a SARIF report is generated containing information about the vulnerabilities found, where they were located, additional information about the vulnerability and links to our learning resources with suggestions on how to fix them.
- OpalOPC is a OPC UA security scanner.
- It is designed to be run manually by security testers, or via a CI/CD pipeline by developers
- It checks your OPC UA server for various security issues that are likely to interest you during software development, as well as attackers during a cyberattack.
For full documentation on using OpalOPC, please consult the Documentation.
Required The full URL (including scheme) of the server to scan.
Required OpalOPC license key.
Optional The base filename used for the scan report. This will be stored in the GITHUB_WORKSPACE (/github/workspace) directory. The resulting reports have suffixes .html
and .sarif
.
Default opalopc-report
Below are some examples of how to use the action by running a OpalOPC scan against our very own Practice target site. This is a deliberately vulnerable OPC UA server setup for testing vulnerability scanners.
steps:
- name: Run OpalOPC Action Step
uses: Molemmat-Oy/opalopc-scan-action@main
with:
target-url: 'opc.tcp://scanme.opalopc.com:53530'
license-key: ${{ secrets.OPALOPC_LICENSE_KEY }}
OpalOPC produces an HTML and a SARIF report of the scan on completion. This report will only include vulnerability details if vulnerabilities were found by the scanner.
By default, this action will not fail a workflow build even if vulnerabilities are found.