Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
67 commits
Select commit Hold shift + click to select a range
010b333
added gitleaks action for testing
GA-XavierGonzalez Jan 12, 2026
17fadeb
added GL license arg
GA-XavierGonzalez Jan 12, 2026
b550864
added minimal ruff step
GA-XavierGonzalez Jan 12, 2026
cdfd093
added bandit step
GA-XavierGonzalez Jan 12, 2026
5201922
yml fmt
GA-XavierGonzalez Jan 12, 2026
593d5c2
Merge branch 'develop' into CICDE-408-modify-existing-scans-to-git-hu…
GA-XavierGonzalez Jan 13, 2026
fa87c8d
added fake secret to test gitleaks
GA-XavierGonzalez Jan 13, 2026
dc30e25
added fake secret to test gitleaks
GA-XavierGonzalez Jan 13, 2026
ff16650
introduced more issues for testing
GA-XavierGonzalez Jan 13, 2026
f689034
testing ruff
GA-XavierGonzalez Jan 13, 2026
e49b75f
ruff output format
GA-XavierGonzalez Jan 13, 2026
1fed60e
added fake aws token
GA-XavierGonzalez Jan 13, 2026
619e408
switched gitleaks to full scan mode. Will continue to flag detected s…
GA-XavierGonzalez Jan 13, 2026
7be947a
troubleshooting gitleaks issue
GA-XavierGonzalez Jan 13, 2026
e1afe20
added permissions to gitleaks step
GA-XavierGonzalez Jan 13, 2026
4eb79c8
testing gitleaks with proper permissions
GA-XavierGonzalez Jan 13, 2026
b663f90
yml fmt
GA-XavierGonzalez Jan 13, 2026
4b33d2b
added workflow dispatch to trivy, modified gitleaks
GA-XavierGonzalez Jan 14, 2026
fd4f0a2
removed test secrets
GA-XavierGonzalez Jan 14, 2026
2435cc1
added push and pr invocations for vuln scanner
GA-XavierGonzalez Jan 14, 2026
7204081
updated trivy action
GA-XavierGonzalez Jan 14, 2026
5487385
removed cron from scanner job
GA-XavierGonzalez Jan 14, 2026
650faec
added action permissions to scanner
GA-XavierGonzalez Jan 14, 2026
fcf4d9f
removed push invocation from linters
GA-XavierGonzalez Jan 14, 2026
b57f5f9
testing dev environment
GA-XavierGonzalez Jan 15, 2026
7eda19f
added push invocation to ruff
GA-XavierGonzalez Jan 15, 2026
5a69ec4
added reference to ECR for image
GA-XavierGonzalez Jan 15, 2026
381f952
removed ruff from dev env, reinstated push invoke to gitleaks
GA-XavierGonzalez Jan 15, 2026
d2b453a
updated aws cred action version
GA-XavierGonzalez Jan 15, 2026
7f698f4
removed push invocation from linters
GA-XavierGonzalez Jan 15, 2026
d73834a
added ID permissions to vuln scanner
GA-XavierGonzalez Jan 15, 2026
c2c488d
format
GA-XavierGonzalez Jan 15, 2026
59ad852
reverted changes to vuln scan and sandbox push
GA-XavierGonzalez Jan 15, 2026
68bd8fa
testing trivy on locally built image
GA-XavierGonzalez Jan 15, 2026
88680f2
clear disk space AFTER trivy
GA-XavierGonzalez Jan 15, 2026
d922ff3
added disk clear step. Added readme notes
GA-XavierGonzalez Jan 15, 2026
16e541e
specified vuln scan to speed up trivy, increased timeout to 15m
GA-XavierGonzalez Jan 15, 2026
527d5d7
specified vuln scan to speed up trivy, increased timeout to 15m
GA-XavierGonzalez Jan 15, 2026
b81b68a
github output format for trivy
GA-XavierGonzalez Jan 15, 2026
c91c954
sarif output with upload permissions for trivy
GA-XavierGonzalez Jan 16, 2026
a8880cf
removed unneeded permissions block
GA-XavierGonzalez Jan 16, 2026
dba2eab
trivy continue on error
GA-XavierGonzalez Jan 16, 2026
47c6df0
trivy set to critical only. python linters combined
GA-XavierGonzalez Jan 16, 2026
f512bb6
yml fmt, removed unneeded permission scoping from gitleaks action
GA-XavierGonzalez Jan 16, 2026
7bafb78
added push invocation to python linters
GA-XavierGonzalez Jan 16, 2026
7051ec7
typo
GA-XavierGonzalez Jan 16, 2026
c4d0ec8
readded push invocations
GA-XavierGonzalez Jan 16, 2026
15780e7
some formatting, added high cves back into trivy for testing
GA-XavierGonzalez Jan 16, 2026
46db3f8
added test bad code
GA-XavierGonzalez Jan 16, 2026
bf14be6
testing github builting scanning
GA-XavierGonzalez Jan 16, 2026
5cf8c77
enabled all trivy alerts
GA-XavierGonzalez Jan 16, 2026
6589aee
testing github builting scanning
GA-XavierGonzalez Jan 16, 2026
0ddf4d3
testing github builting scanning
GA-XavierGonzalez Jan 16, 2026
bec208f
testing github builting scanning
GA-XavierGonzalez Jan 16, 2026
c3fefc2
typo in trivy action
GA-XavierGonzalez Jan 16, 2026
d9e4d6f
added push invocation to trivy
GA-XavierGonzalez Jan 16, 2026
a174f09
reverted invocation for image scanner, specified critical CVE only
GA-XavierGonzalez Jan 16, 2026
3b71cda
removed test secrets
GA-XavierGonzalez Jan 16, 2026
ac667aa
Merge branch 'develop' into CICDE-408-modify-existing-scans-to-git-hu…
GA-XavierGonzalez Jan 16, 2026
74bbc72
refactor
GA-XavierGonzalez Jan 16, 2026
ad5c5b4
fixed reference to scan-image.yml, docs
GA-XavierGonzalez Jan 16, 2026
3e8f0aa
turned off scan-image for draft PR
GA-XavierGonzalez Jan 16, 2026
1808143
turned off integration-test for draft PR
GA-XavierGonzalez Jan 16, 2026
5e4d74c
reverted change
GA-XavierGonzalez Jan 16, 2026
6226695
only trigger python lint on PR with .py change
GA-XavierGonzalez Jan 16, 2026
9955b8b
set gitleaks fetch depth to 1. It will NOT scan commit history
GA-XavierGonzalez Jan 16, 2026
46bfea0
ignored fake secrets with gitleaks config
GA-XavierGonzalez Jan 16, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 18 additions & 0 deletions .github/workflows/gitleaks.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
name: gitleaks
on:
pull_request:
workflow_dispatch:
push:

jobs:
scan:
name: gitleaks
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- uses: gitleaks/gitleaks-action@v2
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
GITLEAKS_LICENSE: ${{ secrets.GITLEAKS_LICENSE }}
27 changes: 27 additions & 0 deletions .github/workflows/python-lint.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
name: Python Lint
on:
pull_request:
paths:
- '**.py'
workflow_dispatch:
push:
paths:
- '**.py'

jobs:
ruff:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: actions/setup-python@v5
with:
python-version: "3.11"
- run: pip install ruff
- run: ruff check --output-format=github .

bandit:
runs-on: ubuntu-latest
steps:
- name: Perform Bandit Analysis
uses: PyCQA/bandit-action@v1

2 changes: 1 addition & 1 deletion .github/workflows/sandbox-build-push.yml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ name: Sandbox build and push latest

on:
workflow_run:
workflows: ["docker checker"]
workflows: ["scan docker image"]
branches: [develop]
types:
- completed
Expand Down
28 changes: 23 additions & 5 deletions .github/workflows/dive.yml → .github/workflows/scan-image.yml
Original file line number Diff line number Diff line change
@@ -1,17 +1,16 @@
---
name: docker checker
name: scan docker image

on:
pull_request:
branches:
- develop
paths:
- '.github/workflows/dive.yml'
- '.github/workflows/scan-image.yml'
- 'docker/**'

push:
paths:
- '.github/workflows/dive.yml'
- '.github/workflows/scan-image.yml'
- 'docker/**'

env:
Expand All @@ -23,7 +22,7 @@ env:
jobs:
dive:
runs-on: ubuntu-latest
name: Analyze image efficiency
name: Build and Scan image
steps:
- name: Checkout
uses: actions/checkout@v3
Expand All @@ -44,6 +43,25 @@ jobs:
run: |
docker build -t ${ORG}/${IMAGE}:_build ./docker/

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@0.33.1
continue-on-error: true
with:
image-ref: '${{ env.ORG }}/${{ env.IMAGE }}:_build'
format: 'sarif'
exit-code: '1'
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL'
scanners: 'vuln'
timeout: '15m0s'
output: 'trivy-results.sarif'

- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v4
with:
sarif_file: 'trivy-results.sarif'

- name: Free disk space
run: |
sudo rm -rf /swapfile /usr/share/dotnet /usr/local/lib/android /opt/ghc /usr/local/share/boost "$AGENT_TOOLSDIRECTORY" || true
Expand Down
24 changes: 0 additions & 24 deletions .github/workflows/vuln-scanner.yml

This file was deleted.

7 changes: 7 additions & 0 deletions .gitleaks.toml
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
[allowlist]
description = "Allow fake secrets used for testing"

regexes = [
"8dyfuiRyq=vVc3RRr_edRk-fK__JItpZ",
"AKIAI234567890123456",
]
13 changes: 13 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -106,3 +106,16 @@ the `docker-compose.override.yml` file, which provides a postgres container.

Any files in the `./notebooks` folder will be mounted in the user's home folder. That is to say that `./notebooks`
will be mounted at `/home/jovyan`/

## CI and Security
- Vulnerability scan on image build
- Trivy runs on push if there was any change to docker
- Critical vulnerabilities will block merge
- If the critical vulnerability is difficult to remediate, reach out to DaS
- Leaks on Commit
- GitLeaks will alert you if your commit diff contains secrets
- Secrets in commit will block merge
- Static Leak Alerts
- EDD conducts intermittent secret scans across the GA codebase
- Python linting and security suggestions
- Any change pushed to a .py file will trigger the Python Lint workflow
2 changes: 1 addition & 1 deletion docker/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,4 +25,4 @@ When time comes to make a bigger change or update some binary packages, remember
to move packages listed in `Dockerfile` into `requirements.txt`.

At the end of compiling solve any incompatibility output from `pip check` by adding the version
in `constraints-odc.txt`.
in `constraints-odc.txt`.
Loading