{"id":13780684,"url":"https://github.com/boostsecurityio/poutine","last_synced_at":"2026-03-09T23:38:25.108Z","repository":{"id":232640430,"uuid":"784369027","full_name":"boostsecurityio/poutine","owner":"boostsecurityio","description":"boostsecurityio/poutine","archived":false,"fork":false,"pushed_at":"2026-02-02T19:01:49.000Z","size":6151,"stargazers_count":357,"open_issues_count":10,"forks_count":30,"subscribers_count":8,"default_branch":"main","last_synced_at":"2026-02-03T09:15:30.607Z","etag":null,"topics":["ci","cli","devops","devsecops","gh-extension","github","github-actions","golang","security","security-scanner","supply-chain","supply-chain-security"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/boostsecurityio.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":".github/CODEOWNERS","security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":"MAINTAINERS.md","copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2024-04-09T17:59:41.000Z","updated_at":"2026-02-02T19:01:10.000Z","dependencies_parsed_at":"2024-04-23T22:37:44.186Z","dependency_job_id":"52ddf540-ddc1-4bd2-a6b0-a82e98999f2d","html_url":"https://github.com/boostsecurityio/poutine","commit_stats":null,"previous_names":["boostsecurityio/poutine"],"tags_count":33,"template":false,"template_full_name":null,"purl":"pkg:github/boostsecurityio/poutine","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boostsecurityio%2Fpoutine","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boostsecurityio%2Fpoutine/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boostsecurityio%2Fpoutine/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boostsecurityio%2Fpoutine/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/boostsecurityio","download_url":"https://codeload.github.com/boostsecurityio/poutine/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boostsecurityio%2Fpoutine/sbom","scorecard":{"id":1238160,"data":{"date":"2025-09-23T07:26:12Z","repo":{"name":"github.com/boostsecurityio/poutine","commit":"591f1c7e465c16ab323d16684bd0c4c2ac8493c1"},"scorecard":{"version":"v5.2.1","commit":"ab2f6e92482462fe66246d9e32f642855a691dc1"},"score":8.3,"checks":[{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#dangerous-workflow"}},{"name":"Dependency-Update-Tool","score":10,"reason":"update tool detected","details":["Info: detected update tool: Dependabot: .github/dependabot.yml:1"],"documentation":{"short":"Determines if the project uses a dependency update tool.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#dependency-update-tool"}},{"name":"Maintained","score":5,"reason":"6 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 5","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#maintained"}},{"name":"Code-Review","score":10,"reason":"all changesets reviewed","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#code-review"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#binary-artifacts"}},{"name":"Token-Permissions","score":9,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql.yml:36","Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql.yml:37","Info: jobLevel 'contents' permission set to 'read': .github/workflows/deploy-github-pages.yml:24","Info: jobLevel 'contents' permission set to 'read': .github/workflows/deploy-github-pages.yml:65","Info: jobLevel 'contents' permission set to 'read': .github/workflows/pop.yml:27","Info: jobLevel 'contents' permission set to 'read': .github/workflows/scorecards.yml:21","Info: jobLevel 'actions' permission set to 'read': .github/workflows/scorecards.yml:22","Info: topLevel 'contents' permission set to 'read': .github/workflows/build_test.yml:8","Info: topLevel 'contents' permission set to 'read': .github/workflows/codeql.yml:29","Info: topLevel 'contents' permission set to 'read': .github/workflows/dependency-review.yml:19","Info: found token with 'none' permissions: .github/workflows/deploy-github-pages.yml:1","Info: topLevel 'contents' permission set to 'read': .github/workflows/golangci-lint.yml:9","Info: topLevel 'pull-requests' permission set to 'read': .github/workflows/golangci-lint.yml:10","Warn: topLevel 'checks' permission set to 'write': .github/workflows/golangci-lint.yml:11","Info: found token with 'none' permissions: .github/workflows/pop.yml:1","Info: found token with 'none' permissions: .github/workflows/release.yml:1","Info: topLevel permissions set to 'read-all': .github/workflows/scorecards.yml:10","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#token-permissions"}},{"name":"CII-Best-Practices","score":5,"reason":"badge detected: Passing","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#cii-best-practices"}},{"name":"Pinned-Dependencies","score":7,"reason":"dependency not pinned by hash detected -- score normalized to 7","details":["Warn: third-party GitHubAction not pinned by hash: .github/workflows/pop.yml:39: update your workflow using https://app.stepsecurity.io/secureworkflow/boostsecurityio/poutine/pop.yml/main?enable=pin","Warn: containerImage not pinned by hash: Dockerfile:4","Warn: containerImage not pinned by hash: Dockerfile:10","Warn: containerImage not pinned by hash: Dockerfile:14","Info:  21 out of  21 GitHub-owned GitHubAction dependencies pinned","Info:  10 out of  11 third-party GitHubAction dependencies pinned","Info:   0 out of   3 containerImage dependencies pinned","Info:   1 out of   1 npmCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#pinned-dependencies"}},{"name":"Vulnerabilities","score":9,"reason":"1 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2025-3900 / GHSA-2464-8j7c-4cjm"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#vulnerabilities"}},{"name":"Signed-Releases","score":8,"reason":"5 out of the last 5 releases have a total of 5 signed artifacts.","details":["Info: signed release artifact: poutine_0.18.0_checksums.txt.sig: https://github.com/boostsecurityio/poutine/releases/tag/v0.18.0","Info: signed release artifact: poutine_0.17.0_checksums.txt.sig: https://github.com/boostsecurityio/poutine/releases/tag/v0.17.0","Info: signed release artifact: poutine_0.16.1_checksums.txt.sig: https://github.com/boostsecurityio/poutine/releases/tag/v0.16.1","Info: signed release artifact: poutine_0.16.0_checksums.txt.sig: https://github.com/boostsecurityio/poutine/releases/tag/v0.16.0","Info: signed release artifact: poutine_0.15.2_checksums.txt.sig: https://github.com/boostsecurityio/poutine/releases/tag/v0.15.2","Warn: release artifact v0.18.0 does not have provenance: https://api.github.com/repos/boostsecurityio/poutine/releases/222446576","Warn: release artifact v0.17.0 does not have provenance: https://api.github.com/repos/boostsecurityio/poutine/releases/213381421","Warn: release artifact v0.16.1 does not have provenance: https://api.github.com/repos/boostsecurityio/poutine/releases/200233074","Warn: release artifact v0.16.0 does not have provenance: https://api.github.com/repos/boostsecurityio/poutine/releases/187054935","Warn: release artifact v0.15.2 does not have provenance: https://api.github.com/repos/boostsecurityio/poutine/releases/182450077"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#signed-releases"}},{"name":"Packaging","score":10,"reason":"packaging workflow detected","details":["Info: Project packages its releases by way of GitHub Actions.: .github/workflows/release.yml:17"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#packaging"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#license"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#fuzzing"}},{"name":"Security-Policy","score":10,"reason":"security policy file detected","details":["Info: security policy file detected: github.com/boostsecurityio/.github/SECURITY.md:1","Info: Found linked content: github.com/boostsecurityio/.github/SECURITY.md:1","Info: Found disclosure, vulnerability, and/or timelines in security policy: github.com/boostsecurityio/.github/SECURITY.md:1","Info: Found text in security policy: github.com/boostsecurityio/.github/SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#security-policy"}},{"name":"Branch-Protection","score":8,"reason":"branch protection is not maximal on development and all release branches","details":["Info: 'allow deletion' disabled on branch 'main'","Info: 'force pushes' disabled on branch 'main'","Warn: 'branch protection settings apply to administrators' is disabled on branch 'main'","Warn: required approving review count is 1 on branch 'main'","Info: codeowner review is required on branch 'main'","Info: status check found to merge onto on branch 'main'","Info: PRs are required in order to make changes on branch 'main'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#branch-protection"}},{"name":"Contributors","score":6,"reason":"project has 2 contributing companies or organizations -- score normalized to 6","details":["Info: found contributions from: nsec, secret-scanning-sig"],"documentation":{"short":"Determines if the project has a set of contributors from multiple organizations (e.g., companies).","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#contributors"}},{"name":"SAST","score":8,"reason":"SAST tool detected but not run on all commits","details":["Info: SAST configuration detected: CodeQL","Warn: 19 commits out of 30 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#sast"}},{"name":"CI-Tests","score":10,"reason":"30 out of 30 merged PRs checked by a CI test -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project runs tests before pull requests are merged.","url":"https://github.com/ossf/scorecard/blob/ab2f6e92482462fe66246d9e32f642855a691dc1/docs/checks.md#ci-tests"}}]},"last_synced_at":"2025-09-26T00:11:41.330Z","repository_id":232640430,"created_at":"2025-09-26T00:11:41.331Z","updated_at":"2025-09-26T00:11:41.331Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29637408,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-19T22:32:43.237Z","status":"ssl_error","status_checked_at":"2026-02-19T22:32:38.330Z","response_time":117,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ci","cli","devops","devsecops","gh-extension","github","github-actions","golang","security","security-scanner","supply-chain","supply-chain-security"],"created_at":"2024-08-03T18:01:18.671Z","updated_at":"2026-03-09T23:38:25.097Z","avatar_url":"https://github.com/boostsecurityio.png","language":"Go","readme":"[![OpenSSF Best Practices](https://www.bestpractices.dev/projects/8787/badge)](https://www.bestpractices.dev/projects/8787)\n[![OpenSSF Scorecard](https://api.securityscorecards.dev/projects/github.com/boostsecurityio/poutine/badge)](https://securityscorecards.dev/viewer/?uri=github.com/boostsecurityio/poutine)\n![build](https://github.com/boostsecurityio/poutine/actions/workflows/build_test.yml/badge.svg)\n![CodeQL](https://github.com/boostsecurityio/poutine/actions/workflows/codeql.yml/badge.svg)\n[![Go Reference](https://pkg.go.dev/badge/github.com/boostsecurityio/poutine/v4.svg)](https://pkg.go.dev/github.com/boostsecurityio/poutine)\n[![Go Report Card](https://goreportcard.com/badge/github.com/boostsecurityio/poutine)](https://goreportcard.com/report/github.com/boostsecurityio/poutine)\n[![SLSA 3](https://slsa.dev/images/gh-badge-level3.svg)](https://slsa.dev)\n\n[![View site - GH Pages](https://img.shields.io/badge/View_site-GH_Pages-2ea44f?style=for-the-badge)](https://boostsecurityio.github.io/poutine/)\n\n# `poutine`\n\nCreated by [BoostSecurity.io](https://boostsecurity.io), `poutine` is a security scanner that detects misconfigurations and vulnerabilities in the build pipelines of a repository. It supports parsing CI workflows from GitHub Actions and Gitlab CI/CD. When given an access token with read-level access, `poutine` can analyze all the repositories of an organization to quickly gain insights into the security posture of the organization's software supply chain.\n\n\u003ctable\u003e\n\u003ctd\u003e\n\n![Finding raised by poutine about \"Arbitrary Code Execution from Untrusted Code Changes\"](https://github.com/boostsecurityio/poutine/assets/172889/ca031a4f-afd8-4e3f-9e66-a2502bd0379b)\n\n\u003c/td\u003e\n\u003c/table\u003e\n\nSee the [documentation](docs/content/en/rules) for a list of rules currently supported by `poutine`.\n\n## Why `poutine`?\n\nIn French, the word \"poutine\", when not referring to the [dish](https://en.wikipedia.org/wiki/Poutine), can be used to mean \"messy\". Inspired by the complexity and intertwined dependencies of modern open-source projects, `poutine` reflects both a nod to our Montreal roots and the often messy, complex nature of securing software supply chains.\n\n## Supported Platforms\n\n- GitHub Actions\n- Gitlab Pipelines\n- Azure DevOps\n- Pipelines As Code Tekton\n\n## Getting Started\n\n### Installation\n\nTo install `poutine`, download the latest release from the [releases page](https://github.com/boostsecurityio/poutine/releases) and add the binary to your $PATH. \n\n\u003c!-- TODO: cosign verify instructions? --\u003e\n\n#### Homebrew\n``` bash\nbrew install poutine\n```\n\n#### Docker\n``` bash\ndocker run -e GH_TOKEN ghcr.io/boostsecurityio/poutine:latest\n```\n\n#### GitHub Actions\n```yaml\n...\njobs:\n  poutine:\n    runs-on: ubuntu-latest\n    permissions:\n      security-events: write\n      contents: read\n    steps:\n    - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1\n#################################################################################################\n    - name: poutine - GitHub Actions SAST\n      uses: boostsecurityio/poutine-action@main # We recommend to use a tagged version and pin it\n#################################################################################################\n    - name: Upload poutine SARIF file\n      uses: github/codeql-action/upload-sarif@4355270be187e1b672a7a1c7c7bae5afdc1ab94a # v3.24.10\n      with:\n        sarif_file: results.sarif\n```\n\n### Usage\n``` bash\npoutine [command] [arguments] [options]\n```\n\n#### Analyze a local repository\n\n``` bash\npoutine analyze_local .\n```\n\n#### Analyze a remote GitHub repository\n\n```bash\npoutine analyze_repo org/repo --token \"$GH_TOKEN\"\n```\n\n#### Analyze all repositories in a GitHub organization\n\n```bash\npoutine analyze_org org --token \"$GH_TOKEN\"\n```\n\n\n#### Analyze all projects in a self-hosted Gitlab instance\n\n``` bash\npoutine analyze_org my-org/project --token \"$GL_TOKEN\" --scm gitlab --scm-base-url https://gitlab.example.com\n```\n\n### Configuration Options\n\n```\n--token              SCM access token (required for the commands analyze_repo, analyze_org) (env: GH_TOKEN)\n--format             Output format (default: pretty, json, sarif)\n--ignore-forks       Ignore forked repositories in the organization (analyze_org)\n--scm                SCM platform (default: github, gitlab)\n--scm-base-url       Base URI of the self-hosted SCM instance\n--threads            Number of threads to use (default: 2)\n--config             Path to the configuration file (default: .poutine.yml)\n--skip               Add rules to the skip list for the current run (can be specified multiple times)\n--verbose            Enable debug logging\n--fail-on-violation  Exit with a non-zero code (10) when violations are found\n```\n\nSee [.poutine.sample.yml](.poutine.sample.yml) for an example configuration file.\n\n### Custom Rules\n\n`poutine` supports custom Rego rules to extend its security scanning capabilities. You can write your own rules and include them at runtime.\n\n#### Configuration\n\nCreate a `.poutine.yml` configuration file in your current working directory, or use a custom path with the `--config` flag:\n\n```bash\npoutine analyze_local . --config my-config.yml\n```\n\nIn your configuration file, specify the path(s) to your custom rules using the `include` directive:\n\n```yaml\ninclude:\n  - path: ./custom_rules\n  - path: ./github_actions\n```\n\n#### Writing Custom Rules\n\nCustom Rego rules must:\n1. Be saved as `*.rego` files in the included directory\n2. Follow the package naming convention: `package rules.\u003crule_name\u003e`\n3. Define a `rule` variable with metadata\n4. Define a `results` set containing findings\n\n**Example custom rule:**\n\n```rego\npackage rules.custom_injection\n\nimport data.poutine\nimport rego.v1\n\n# METADATA\n# title: Custom Injection Detection\n# description: Detects potential injection vulnerabilities in workflows\n# custom:\n#   level: warning\n\nrule := poutine.rule(rego.metadata.chain())\n\n# Define pattern to detect (properly escaped for Rego)\npatterns.github contains `\\\\$\\\\{\\\\{[^\\\\}]+\\\\}\\\\}`\n\nresults contains poutine.finding(rule, pkg.purl, {\n  \"path\": workflow.path,\n  \"line\": step.lines.run,\n  \"job\": job.id,\n  \"step\": i,\n  \"details\": \"Potential injection found in step\",\n}) if {\n  pkg := input.packages[_]\n  workflow := pkg.github_actions_workflows[_]\n  job := workflow.jobs[_]\n  step := job.steps[i]\n  step.run  # Ensure step has a run command\n  regex.match(patterns.github[_], step.run)\n}\n```\n\n**Key points:**\n- Use `import data.poutine` and `import rego.v1` for modern Rego syntax and poutine utilities\n- Use `rule := poutine.rule(rego.metadata.chain())` to extract metadata from METADATA comments\n- The `package` name determines the rule identifier (e.g., `package rules.custom_injection` → rule ID: `custom_injection`)\n- Add METADATA comments to describe the rule with `title`, `description`, and `level`\n- Set the severity `level` to `note`, `warning`, or `error`\n- Use `poutine.finding(rule, pkg.purl, {...})` to create findings that match the poutine schema\n- The `results` set should contain findings with fields like `path`, `line`, `job`, `step`, `details`\n\nFor more examples, see:\n- [poutine-rules repository](https://github.com/boost-rnd/poutine-rules) - External rule examples\n- Built-in rules in [opa/rego/rules/](./opa/rego/rules/) directory\n- [.poutine.sample.yml](.poutine.sample.yml) - Configuration examples\n\n### Acknowledging Findings\n\n`poutine` supports skipping (acknowledging) specific findings that are not relevant in your context. This can be useful when:\n- A finding is a false positive\n- The security concern has been addressed through other means (e.g., hardened self-hosted runners)\n- You've accepted the risk for a particular finding\n\nTo acknowledge findings, you can either:\n1. Add a `skip` section to your `.poutine.yml` configuration file\n2. Use the `--skip` command-line flag (e.g., `--skip rule_name`) for one-time skipping\n\n#### Configuration File\n\nAdd a `skip` section to your `.poutine.yml` configuration file. Each skip rule can filter findings by:\n- `job`: Filter by job name\n- `level`: Filter by severity level (note, warning, error)\n- `path`: Filter by workflow file path\n- `rule`: Filter by rule name\n- `purl`: Filter by package URL\n- `osv_id`: Filter by OSV ID\n\nExample configuration:\n\n```yaml\nskip:\n  # Skip all note-level findings\n  - level: note\n\n  # Skip findings in a specific workflow\n  - path: .github/workflows/safe.yml\n\n  # Skip a specific rule everywhere\n  - rule: unpinnable_action\n\n  # Skip a rule for specific workflows\n  - rule: pr_runs_on_self_hosted\n    path:\n      - .github/workflows/pr.yml\n      - .github/workflows/deploy.yml\n\n  # Skip findings for specific packages\n  - rule: github_action_from_unverified_creator_used\n    purl:\n      - pkg:githubactions/dorny/paths-filter\n```\n\nFor more examples, see [.poutine.sample.yml](.poutine.sample.yml).\n\n#### Command Line\n\nYou can also skip rules on the command line using the `--skip` flag. Note that the command-line flag only supports skipping rules by name globally and does not support the granular filtering options (job, path, level, etc.) available in the configuration file.\n\n```bash\n# Skip a single rule globally\npoutine analyze_repo org/repo --skip unpinnable_action\n\n# Skip multiple rules globally\npoutine analyze_repo org/repo --skip unpinnable_action --skip pr_runs_on_self_hosted\n```\n\nThis is useful for one-time analysis or when you want to temporarily ignore specific rules without modifying your configuration file. For more granular control (e.g., skipping a rule only in specific workflows), use the configuration file instead.\n\n## AI Coding Assistant Integration (MCP)\n\n`poutine` can be integrated with AI coding assistants like Claude Code, Gemini, etc. through the Model Context Protocol (MCP). This allows AI assistants to analyze repositories and validate CI/CD pipelines directly from your development environment.\n\nFor detailed setup instructions for your specific AI coding tool, see the [MCP Integration Guide](MCP_INTEGRATION.md).\n\n## Building from source\n\nBuilding `poutine` requires Go 1.25+.\n\n```bash\ngit clone https://github.com/boostsecurityio/poutine.git\ncd poutine\nmake build\n```\n\n## Development\n### Updating Build Platform CVE Database\n```bash\ngo test -tags build_platform_vuln_database ./...\nopa fmt -w opa/rego/external/build_platform.rego\n```\n\n## See Also \n\nFor examples of vulnerabilities in GitHub Actions workflows, you can explore the [Messy poutine GitHub organization](https://github.com/messypoutine). It showcases real-world vulnerabilities from open-source projects readily exploitable for educational purposes. \n\nTo get started with some hints, try using `poutine` to analyze the `messypoutine` organization:\n``` bash\npoutine analyze_org messypoutine --token `gh auth token`\n```\n\nYou may submit the flags you find in a [private vulnerability disclosure](https://github.com/messypoutine/.github/security/advisories/new).\n\n## License\n\nThis project is licensed under the Apache License 2.0 - see the LICENSE file for details.\n","funding_links":[],"categories":["cli","Static workflow file scanning","Go","Tools"],"sub_categories":["ArgoCD"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fboostsecurityio%2Fpoutine","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fboostsecurityio%2Fpoutine","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fboostsecurityio%2Fpoutine/lists"}