Deadshot is a Pull Request scanner that looks for the introduction of secrets via PRs by matching each diff line against a set of known secret expressions.
Service is responsible for:
- Real-time Pull Request diff processor to check for secrets being committed to Github via new code
- Notify the user on the PR conversation if it flags something
- Slack notify the security team channel when certain secrets are identified in code for which you've enabled slack notifications via a flag in regex.json
Service does NOT:
- Do any static or dynamic code analysis
Deadshot is a Flask-Celery-Redis multi-container application that is installed as a Github app to run on every Pull Request created against the main branch of a repo on which the Github app is installed.
The Flask container is the entry point for the service by exposing API routes defined in blueprints.py. Once a Pull request payload is received on the API route the service forwards the payload to a Redis queue for the Celery container to pick up and scan through the diff of the Pull Request. After the celery container scans for specified secrets regular expressions, it comments on PRs, slack notifies the security team channel, or creates a JIRA ticket for the team to follow up on. The Github app is configured with the Flask API URL and a shared secret used for generating the payload SHA checksum.
One way the API URL can be setup is by deploying this code on an host and assigning a application load balancer to this host.
Note: When creating the app please make sure you have a DNS ready for host on which you'll be deploying Deadshot containers and a secure secret string for the webhook secret.
Github Admins would need to create and install a Github app on Github before running or deploying the Deadshot application. To know more about creating a Github app please read this guide
App Name: deadshot (All lower case. This is important as the service uses this name to fetch previous comments it has made on a PR)
Webhook URL: http(s)://your-hosted-deadshot-dns/api/v1/deadshot-webhook
To test this locally you can create a ngrok endpoint to feed into your Github app webhook section
For this application to work your Github app will have to enable the following permissions and subscriptions on the permissions page of the Github app: Repository Permissions:
- Metadata: Read-only
- PullRequests: Read & write
- Webhooks: Read & write
All other permissions are left unchanged to the default value of No access
Subscribe to events:
- Pull request
- Pull request review
Finally click “Create GitHub App”. After successful app creation follow the “generate a private key” link in the top section of the app web page
Once the private key is generated store it in a secure location. This generated private key is one of the pieces of data used to generate a session token for app interaction.
After generating the private key, install the app on all the orgs you want it to monitor.
This is a multi-container application designed to bring up all three containers (Flask, Celery, Redis) via the /bin/run.sh, so running the Dockerfile image should bring up the entirety of the application
Note: For deployment using docker-compose.yaml populate the these environment variables in localdev.env. If you're deploying this by building and running each container image individually via Dockerfile.api, Dockerfile.celery then the these environment variables are in the respective Dockerfiles
The three variables below are single string values provided by the user
- GITHUB_URL: This is the URL behind which your Github instance is accessed. Please provide the DNS without scheme or port. Eg. if your Github web URL is https://github.mockcompany.com then provide the value github.mockcompany.com
- GITHUB_API: This is the API URL for Github. Eg. if you have your Github DNS as https://github.mockcompany.com then your API would be something like https://github.mockcompany.com/api/v3
- JIRA_SERVER= Your company's JIRA server web URL
The below environment variables load path to files with credentials in them. Load the json file key values in the files available here before running the application.
- SECRET_GITHUB_SECRET: This variable loads github_secrets.json and has the Github app's shared webhook secret, integration ID, and the pem key. All these three secrets are obtained from the Github app settings page webhook secret - This is the secret configured during the app creation process integration ID - This is the app ID shown on the github app settings page pem key - this is the private key generated during the app installation process
- SECRET_SLACK_WEBHOOKS: This slack_webhook.json and has the webhook URL to which the deadshot app will send slack notifications when it finds secrets in a PR for which you set slack_alert=True in regex.json
- SECRET_JIRA_AUTH: This loads jira_user.json and has the username and password for the user ID to access the org's JIRA board Note: If you do not provide valid values in SECRET_SLACK_WEBHOOKS and SECRET_JIRA_AUTH the service will soft fail and print error messages about failure to initiate slack and jira methods in the docker container logs
Note: If you do not move the JSON secrets files location then you do not need to update the above three environment variables values already present in the Dockerfiles or docker-compose.yaml
This command will use docker-compose.yaml to bring up all the containers. Please update configuration/environment/localdev.env with values relevant to your organisation before running the below command
make serve
Once you’ve done this and do not intend to use Dockerfile for serving the application then jump to “Server Healthcheck” section
There are two ways to build and run the Dockerfiles. There are four Dockerfiles present in the repository, three of which are used to generate an individual image for each container needed for this service to work, and the fourth one is a Dockerfile setup to create a image that can be used to either bring up the Flask application or the celery worker depending on the DEADSHOT_RUN_MODE environment variable value (api or worker) provided To run any of the steps below you need to be present in the root folder of the repository
Note: Ensure you’ve updated the environment variables in Dockerfile.api and Dockerfile.celery files
There are three Dockerfiles relevant to this step. Dockerfile.api, Dockerfile.celery, and Dockerfile.redis
docker build -f Dockerfile.api -t deadshot-api:<version> .
docker build -f Dockerfile.celery -t deadshot-worker:<version> .
docker build -f Dockerfile.redis -t deadshot-redis:<version> .
The three images built in the previous steps all run in separate networks due to which they won't be able to talk to each other. To enable inter-container communications we need to add them to a container network
docker network create deadshot-network
Run the images using the created network in the following order: Start redis container:
docker run --net deadshot-network --name redis deadshot-redis:<version>
Start celery container:
docker run --net deadshot-network deadshot-worker:<version>
Start Flask API container:
docker run --net deadshot-network -p 9001:9001 deadshot-api:<version>
This step is useful only if you have a orchestration that allows you to feed in environment variables, secrets and other configurations at deployment time. Please use the above method of running the containers if you don't have a configurable CI/CD setup.
To build a single docker image for bringing up the api and celery worker based on DEADSHOT_RUN_MODE environment variable
make build
This command will also create the redis image that is needed for service
If the built image is run with the environment variable DEADSHOT_RUN_MODE=api, it will bring up the Flask application If the image is run with environment variable DEADSHOT_RUN_MODE=worker then the celery worker will be initiated
Now that the API is ready to receive requests navigating to http://localhost:9001/api/v1/heartbeat
in a browser should return a valid response or you could do a curl
curl localhost:9001/api/v1/healthcheck
Both should show the following message:
{"healthcheck": "ready"}
If you have a webhook payload of the Github app for your Pull Request then you can run the following curl command locally to test your application:
curl -X POST -H "content-type: application/json" -H "X-GitHub-Enterprise-Host: github.mockcompany.com" -H "X-Hub-Signature: sha1=85df4936c6396c149be94144befab41168149840" -H "X-GitHub-Event: pull_request" -d @tests/fixtures/good_pr.json http://localhost:9001/api/v1/deadshot-webhook
If you want the tool to monitor other types of secrets then add your regular expressions in the regex.json file
Note: Entropy check flag allows you to look for high entropy findings in addition to the regular expression match
At this time, Deadshot has only tested with Github Enterprise, but should work with Github cloud as well.