Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/securestackco/actions-secrets
Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host strings, API keys, .env and config files and more
https://github.com/securestackco/actions-secrets
actions deployment devsecops github-actions secrets secrets-detection secrets-discovery-service secrets-scan secrets-scanner security security-automation security-tools vulnerability-detection
Last synced: about 2 months ago
JSON representation
Adding this GitHub Action will scan your repository for sensitive data in your source code. We find things like passwords, server host strings, API keys, .env and config files and more
- Host: GitHub
- URL: https://github.com/securestackco/actions-secrets
- Owner: SecureStackCo
- License: gpl-3.0
- Created: 2021-12-02T07:44:47.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2023-06-07T18:05:11.000Z (over 1 year ago)
- Last Synced: 2024-12-03T23:45:54.496Z (about 2 months ago)
- Topics: actions, deployment, devsecops, github-actions, secrets, secrets-detection, secrets-discovery-service, secrets-scan, secrets-scanner, security, security-automation, security-tools, vulnerability-detection
- Homepage:
- Size: 1.27 MB
- Stars: 30
- Watchers: 6
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# SecureStack Secrets Analysis GitHub Action
A GitHub Action that analyses your source code for secrets, credentials, API keys, server and database hostnames/URLS, and a lot more! When you add this to GitHub Actions we will analyze your source code to make sure there is no sensitive data in your commit. See below for the specific types of credentials and files we scan for.
```
name: Example SecureStack Secrets Analysis GitHub Action
on: push
jobs:
security:
runs-on: ubuntu-latest
steps:
- name: Checkout repo for running secrets analysis within workflow
id: checkout
uses: actions/[email protected]
with:
fetch-depth: 0
- name: Secrets Analysis Step
id: secrets
uses: SecureStackCo/[email protected]
with:
securestack_api_key: ${{ secrets.SECURESTACK_API_KEY }}
securestack_app_id: ${{ secrets.SECURESTACK_APP_ID }}
severity: critical
flags: '-d 1'```
NOTE - to understand possible values for the action input `flags`, run the SecureStack cli locally:`$ bloodhound-cli code --help`
## Create your SecureStack API Key and save as GitHub Secret
1. Log in to [SecureStack](https://app.securestack.com) with your GitHub credentials.
2. Go to Settings in the lower left corner, and then select the 6th tab: API.![Create API key](./images/securestack-create-apikey.png)
3. Generate a new API key and copy the value.![Copy API key](./images/securestack-copy-apikey.png)
4. Now back in GitHub, go to Settings for your GitHub repository and click on Secrets, and then Actions at the bottom left.
5. Create a new secret named SECURESTACK_API_KEY and paste the value from step 2 into the field and click "Add secret".![Create GitHub Secret for API key](./images/securestack-github-apikey-secret.png)## Retreiving your SecureStack Application ID
1. Log in to [SecureStack](https://app.securestack.com).
2. In the application drop down at the top left choose the application you want to use and click on "Copy Application ID" ![Copy Application ID](./images/securestack-copy-appid.png)
3. Create a new secret named SECURESTACK_APP_ID and paste the value from step 2 into the field and click "Add secret".![Create GitHub Secret for app_id](./images/securestack-github-appid-secret.png)
4. When completed the two GitHub Secrets should look like this![Successfully created two secrets](./images/securestack-github-secrets-success.png)## What types of credentials does this GitHub Action find?
1. API keys like Stripe, AWS, Amplitude and a bazillion more
2. Server and database hostnames or URLS
3. Passwords and Usernames
4. .env files and git indexes## How can I see the output of the secrets analysis?
1. You can view the analysis output right in the GitHub Action workflow output![workflow output](./images/securestack-secrets-output-action-log.png)
2. You can run a local secrets analysis with our [bloodhound-cli : ](https://app.securestack.com/download-cli)
``` bloodhound-cli code -s -d 1 -a ```3. You can interact with the analysis output in the SecureStack SaaS ![platform](./images/securestack-secrets-saas-view.png)
## Check out our other GitHub Actions:
1. [SecureStack Software Composition Analysis (SCA)](https://github.com/marketplace/actions/securestack-application-composition-analysis) - Scan your application for vulnerable third-party and open source libraries.
2. [SecureStack SBOM](https://github.com/marketplace/actions/securestack-sbom) - Create a software bill of materials (SBOM) for your application.
3. [SecureStack Web Vulnerability & Cloud Misconfiguration Analysis](https://github.com/marketplace/actions/securestack-web-vulnerability-analysis) - Scan your running application url for cloud misconfigurations and web vulnerabilities.
4. [SecureStack Log4j Analysis](https://github.com/marketplace/actions/securestack-log4j-vulnerability-analysis) - Scan your application for Log4j/Log4Shell vulnerabilities.
5. Or, our [All-in-One GitHub Action](https://github.com/marketplace/actions/securestack-all-in-one-github-action) - We've put all of our actions together into one "Action to rule them ALL"!## Learn more about SecureStack with our YouTube Channel:
Coming soon!Made with 💜 by [SecureStack](https://securestack.com)