Skip to content
molemmat-oy

GitHub Action

OpalOPC Scan Action

v1.0.0 Latest version

OpalOPC Scan Action

molemmat-oy

OpalOPC Scan Action

Runs a OpalOPC scan against a target site

Installation

Copy and paste the following snippet into your .yml file.

              

- name: OpalOPC Scan Action

uses: Molemmat-Oy/[email protected]

Learn more about this action in Molemmat-Oy/opalopc-scan-action

Choose a version

OpalOPC Scan Action

This action runs a OpalOPC vulnerability scan against a target server. On completion, an HTML and a SARIF report is generated containing information about the vulnerabilities found, where they were located, additional information about the vulnerability and links to our learning resources with suggestions on how to fix them.

About OpalOPC

  • OpalOPC is a OPC UA security scanner.
  • It is designed to be run manually by security testers, or via a CI/CD pipeline by developers
  • It checks your OPC UA server for various security issues that are likely to interest you during software development, as well as attackers during a cyberattack.

For full documentation on using OpalOPC, please consult the Documentation.

Inputs

target-url

Required The full URL (including scheme) of the server to scan.

license-key

Required OpalOPC license key.

output-base-filename

Optional The base filename used for the scan report. This will be stored in the GITHUB_WORKSPACE (/github/workspace) directory. The resulting reports have suffixes .html and .sarif.

Default opalopc-report

Examples

Below are some examples of how to use the action by running a OpalOPC scan against our very own Practice target site. This is a deliberately vulnerable OPC UA server setup for testing vulnerability scanners.

Basic Usage

steps:
  - name: Run OpalOPC Action Step
    uses: Molemmat-Oy/opalopc-scan-action@main
    with:
      target-url: 'opc.tcp://scanme.opalopc.com:53530'
      license-key: ${{ secrets.OPALOPC_LICENSE_KEY }}

Suggested Usage

OpalOPC produces an HTML and a SARIF report of the scan on completion. This report will only include vulnerability details if vulnerabilities were found by the scanner.

By default, this action will not fail a workflow build even if vulnerabilities are found.