This project demonstrates key GitHub Advanced Security (GHAS) features, including Code Scanning, Secret Scanning, and Dependency Management.
Objective: Identify and fix security vulnerabilities in the source code using CodeQL analysis.
The code-scan.yml
GitHub workflow
- Runs all custom queries from the
custom-queries
folder - The scan runs on push and pull requests to
main
branch. - Supports multi-language analysis (Currently Java)
For running CodeQL locally, please refer to the instructions provided in the run-codeql-locally
file.
Objective: Detect and prevent accidental exposure of secrets.
GitHub Secret Scanning identifies exposed secrets in the application.properties
file.
Objective: Continuously monitor dependencies for known vulnerabilities.
- For Gradle projects, the
dependency-submission.yml
GitHub workflow submits dependencies to the Dependency Graph via the Dependency Submission API. - This enables Dependabot Alerts to detect vulnerabilities in dependencies.
- Dependabot scans dependency files for outdated versions.
- Automatically creates individual pull requests (PRs) for updates.
- Configuration is managed via
dependabot.yml
.
- Enable GitHub Advanced Security (GHAS) for this repository.
- Review and configure the
dependabot.yml
anddependency-submission.yml
files. - Enable the set up for Code Scanning.
- Monitor security alerts in the GitHub Security tab.
🔹 Created for demonstration purposes. 🚀