Skip to content

Conversation

@ongamse
Copy link
Owner

@ongamse ongamse commented Jan 5, 2023

ShiftLeft LogoShiftLeft Logo

This pull request enables build rules. You can read more about build rules here. The build rules are controlled by the shiftleft.yml file in the repository.

Visit shiftleft.io to see the security findings for this repository.

We've done a few things on your behalf

  • Forked this demo application
  • Generated a unique secret SHIFTLEFT_ACCESS_TOKEN to allow GitHub Actions in this repository to communicate with the ShiftLeft API
  • Committed a GitHub Action that will invoke ShiftLeft CORE's NextGen Static Application Security Testing (NG SAST) on all future pull requests on this repository
  • Created this pull request that demonstrates build rules. It also adds a status check that displays the result of the GitHub Action

Questions? Comments? Want to learn more? Get in touch with us or check out our documentation.

@github-actions
Copy link

github-actions bot commented Jan 5, 2023

ShiftLeft LogoShiftLeft Logo

Checking analysis of application shiftleft-c-demo against 3 build rules.

Using sl version 0.9.1650 (b9a420ebbbae5fb09a7cc69f913b5405b70fddaa).

Checking findings on scan 1.

Results per rule:

  • Allow no critical findings: FAIL
    (4 matched vulnerabilities; configured threshold is 0).

    Findings:

       ID   CVSS    Rating    CVE              Title                                                                                                                                                      
      3    9.0   critical   CVE-2021-36159   pkg:pkg/alpine/[email protected]                                                                                                                         
     25    9.0   critical   CVE-2022-28391   BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal.…
     34    9.0   critical   CVE-2022-37434   zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applicati…
     58    9.0   critical   CVE-2021-3711    In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this fun…
     Severity rating   Count 
     Critical              4 
     High                  0 
     Medium                0 
     Low                   0 
     CVE              Count 
     CVE-2022-37434       1 
     CVE-2022-28391       1 
     CVE-2021-36159       1 
     CVE-2021-3711        1 
  • Allow one OSS or container finding: FAIL
    (30 matched vulnerabilities; configured threshold is 1).

    First 5 findings:

       ID   CVSS    Rating    CVE              Title                                                                                                                                                      
      3    9.0   critical   CVE-2021-36159   pkg:pkg/alpine/[email protected]                                                                                                                         
     25    9.0   critical   CVE-2022-28391   BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal.…
     34    9.0   critical   CVE-2022-37434   zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applicati…
     58    9.0   critical   CVE-2021-3711    In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this fun…
      1    7.0     high     CVE-2021-30139   pkg:pkg/alpine/[email protected]                                                                                                                         
     Severity rating   Count 
     Critical              4 
     High                 21 
     Medium                4 
     Low                   1 
  • Allow no reachable OSS vulnerability: pass
    (0 matched vulnerabilities; configured threshold is 0).

2 rules failed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants