https://github.com/nwestfall/netsparkerscanrunner
Quickly and easily a Netsparker Scan using your Netsparker Cloud Account
https://github.com/nwestfall/netsparkerscanrunner
netsparker node scan security
Last synced: about 1 month ago
JSON representation
Quickly and easily a Netsparker Scan using your Netsparker Cloud Account
- Host: GitHub
- URL: https://github.com/nwestfall/netsparkerscanrunner
- Owner: nwestfall
- License: other
- Created: 2019-03-15T15:41:10.000Z (about 6 years ago)
- Default Branch: main
- Last Pushed: 2022-08-18T19:34:39.000Z (almost 3 years ago)
- Last Synced: 2025-04-14T22:14:33.863Z (about 1 month ago)
- Topics: netsparker, node, scan, security
- Language: JavaScript
- Size: 105 KB
- Stars: 4
- Watchers: 1
- Forks: 0
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Netsparker Scan Runner
[](https://badge.fury.io/js/netsparkerscanrunner)
Quickly and easily run a Netsparker Scan using your Netsparker
Cloud Account.## Requirements
You have a [Netsparker Cloud](https://www.netsparkercloud.com/) account.## Features
Using the Netsparker Cloud API, run a scan using a profile against a url. You can then either make it "fire-and-forget" or report back either in the console or jUnit.
## Install
`npm install -g netsparker-scan-runner`
## How to Use (Runner)
`netsparker-scan-runner --help`
```
Netsparker Scan RunnerRun a scan against your Netsparker Cloud instance using a configured profile.
Can optionally wait for the report.Options
--userid userid The user id from your Netsparker Account
--apitoken apitoken The api token from your Netsparker Account
--profilename profilename The profile name saved in your Netsparker Account
--targetsite The target url you want to run against
--report If you want to wait around for the report (true) or to file and forget
(false)
--junit If you want to generate a junit report, enter the file name and location here
--help Print this usage guide
````netsparker-scan-runner -u userid -t apitoken -p ProfileName -s https://example.com/ -j path/to/junit/report.xml`
And that's it. Super simple. Super easy.
## How to Use (GitHub Action)
The same runner will work as a github action.```yml
- name: Netsparker Scan
id: netsparker
uses: nwestfall/netsparkerscanrunner@main
with:
userid: ${{ secrets.NETSPARKER_USER_ID }}
apitoken: ${{ secrets.NETSPARKER_API_TOKEN }}
profilename: ${{ secrets.NETSPARKER_PROFILE_NAME }}
targetsite: ${{ secrets.NETSPARKER_TARGET_SITE }}
junit: tests.xml
criticalthreshold: 0 #this means 1 more
highthreshold: 2
mediumthreshold: 4
```### Spec
#### Environment variables
- None
#### Inputs
- userid (required) - The user id from your Netsparker Account
- apitoken (required) - The api token from your Netsparker Account
- profilename (required) - The profile name saved in your Netsparker Account
- targetsite (required) - The target url you want to run against
- report (default: true) - If you want to wait around for the report (true) or to fire and forget (false)
- junit - If you want to generate a junit report, enter the file name and location here
- criticalthreshold - Critical Severity Threshold
- highthreshold - High Severity Threshold
- mediumthreshold - Medium Severity Threshold
#### Outputs
- scanresults - Scan results from Netsparker (blank if `report` is false)
- scanreport - Scan report from Netsparker (blank if `report` is false)