GitHub Action
Deep Security Smart Check Scan Action
You can find the original code on: https://github.com/deep-security/smartcheck-scan-action
Scan your containers with Deep Security Smart Check).
This tool is used by the Deep Security Smart Check plugin for Jenkins and can also be used as a GitHub Action.
- Have an Deep Security Smart Check deployed. Sign up for free trial now if it's not already the case!
- A container image to scan in any Docker Registry.
Add an Action in your .github/workflow
yml file to scan your image with Deep Security Smart Check.
- name: Deep Security Smart Check Scan Action
uses: felipecosta09/Deep-Security-Smart-Check-Scan-Action@version*
with:
# Mandatory
DSSC_IMAGE_NAME: myorg/myimage
DSSC_SMARTCHECK_HOST: myorg.com
DSSC_SMARTCHECK_USER: admin
DSSC_SMARTCHECK_PASSWORD: 12345
DSSC_IMAGE_PULL_AUTH: {"username":"<user>","password":"<password>"}
# Optional
DSSC_INSECURE_SKIP_TLS_VERIFY: true
DSSC_INSECURE_SKIP_REGISTRY_TLS_VERIFY: true
DSSC_PREREGISTRY_SCAN: false
DSSC_PREREGISTRY_HOST: myorg.com
DSSC_PREREGISTRY_USER: admin
DSSC_PREREGISTRY_PASSWORD: 12345
DSSC_RESULTS_FILE: /results.json
DSSC_FINDINGS_THRESHOLD: '{"malware": 100, "vulnerabilities": { "defcon1": 100, "critical": 100, "high": 100 }, "contents": { "defcon1": 100, "critical": 100, "high": 100 }, "checklists": { "defcon1": 100, "critical": 100, "high": 100 }}'
All parameters can be passed as CLI parameters or environment variables by
switching to all caps and prefixing with DSSC_
. Example: --image-name
could
be given with DSSC_IMAGE_NAME
.
-
smartcheck-host | DSSC_SMARTCHECK_HOST
- The hostname of the Deep Security Smart Check deployment. Example:
smartcheck.example.com
- The hostname of the Deep Security Smart Check deployment. Example:
-
insecure-skip-tls-verify | DSSC_INSECURE_SKIP_TLS_VERIFY
- If the client should ignore certificate errors when connecting to Deep Security Smart Check. You may want to set this if you've configured a self signed cert.
-
smartcheck-user | DSSC_SMARTCHECK_USER
- The username to authenticate with the Deep Security Smart Check deployment
-
smartcheck-password | DSSC_SMARTCHECK_PASSWORD
- The password to authenticate with the Deep Security Smart Check deployment
-
image-name | DSSC_IMAGE_NAME
- The name of the image to scan
-
image-pull-auth | DSSC_IMAGE_PULL_AUTH
-
A JSON object of credentials for authenticating with the registry to pull the image from. Example:
{ "username": "<user>", "password": "<password>" }
-
If you're using AWS, you can use this example below:
'{"aws":{"region":"us-east-1","accessKeyID":"'$AWS_ACCESS_KEY_ID'","secretAccessKey":"'$AWS_SECRET_ACCESS_KEY'"}}'
PS.: ALWAYS use secrets to expose your credentials!
See creating a scan in the Deep Security Smart Check API Reference for additional registry credentials options.
-
-
insecure-skip-registry-tls-verify | DSSC_INSECURE_SKIP_REGISTRY_TLS_VERIFY
- If Deep Security Smart Check should ignore certificate errors from the image registry.
-
preregistry-scan | DSSC_PREREGISTRY_SCAN
- Specify this option to trigger a "pre-registry scan", which pushes the image to a temporary registry on the scan system.
-
preregistry-host | DSSC_PREREGISTRY_HOST
- The hostname of the temporary registry. Defaults to the
smartcheck-host
on port 5000.
- The hostname of the temporary registry. Defaults to the
-
preregistry-user | DSSC_PREREGISTRY_USER
- The username to authenticate with the temporary registry.
-
preregistry-password | DSSC_PREREGISTRY_PASSWORD
- The password to authenticate with the temporary registry.
-
results-file | DSSC_RESULTS_FILE - default:
scan-results.json
- The path to write the scan results to. If not provided, the scan results will be written to stdout.
-
findings-threshold | DSSC_FINDINGS_THRESHOLD
-
A JSON object that can be used to fail this step if an image contains findings that exceed the threshold.
Default value:
{ "malware": 0, "vulnerabilities": { "defcon1": 0, "critical": 0, "high": 0 }, "contents": { "defcon1": 0, "critical": 0, "high": 0 }, "checklists": { "defcon1": 0, "critical": 0, "high": 0 } }
Schema:
interface FindingsThreshold { malware?: number; contents?: { defcon1?: number; critical?: number; high?: number; medium?: number; low?: number; negligible?: number; unknown?: number; }; vulnerabilities?: { defcon1?: number; critical?: number; high?: number; medium?: number; low?: number; negligible?: number; unknown?: number; }; checklists?: { defcon1?: number; critical?: number; high?: number; medium?: number; low?: number; negligible?: number; unknown?: number; }; }
-
name: Deep Security Smart Check
on:
push:
branches:
- master
jobs:
Deep-Security-Smart-Check-Scan-Action:
runs-on: ubuntu-latest
steps:
- name: Deep Security Smart Check Scan ECR
uses: felipecosta09/Deep-Security-Smart-Check-Scan-Action@version*
with:
DSSC_IMAGE_NAME: myECRrepo/myimage
DSSC_SMARTCHECK_HOST: ${{ secrets.DSSC_SMARTCHECK_HOST }}
DSSC_SMARTCHECK_USER: ${{ secrets.DSSC_SMARTCHECK_USER }}
DSSC_SMARTCHECK_PASSWORD: ${{ secrets.DSSC_SMARTCHECK_PASSWORD }}
DSSC_IMAGE_PULL_AUTH: ${{ secrets.DSSC_IMAGE_PULL_AUTH }}
DSSC_FINDINGS_THRESHOLD: '{"malware": 999, "vulnerabilities": { "defcon1": 999, "critical": 999, "high": 999 }, "contents": { "defcon1": 999, "critical": 999, "high": 999 }, "checklists": { "defcon1": 999, "critical": 999, "high": 999 }}'
DSSC_INSECURE_SKIP_TLS_VERIFY: true
DSSC_INSECURE_SKIP_REGISTRY_TLS_VERIFY: true
- name: Cloud One Container Security Scan ACR
uses: felipecosta09/Deep-Security-Smart-Check-Scan-Action@version*
with:
DSSC_IMAGE_NAME: myrepo.azurecr.io/myimage
DSSC_SMARTCHECK_HOST: ${{ secrets.DSSC_SMARTCHECK_HOST }}
DSSC_SMARTCHECK_USER: ${{ secrets.DSSC_SMARTCHECK_USER }}
DSSC_SMARTCHECK_PASSWORD: ${{ secrets.DSSC_SMARTCHECK_PASSWORD }}
DSSC_IMAGE_PULL_AUTH: '{"username": "${{ secrets.ACR_USER }}","password": "${{ secrets.ACR_PASSWORD }}"}'
DSSC_FINDINGS_THRESHOLD: '{"malware": 999, "vulnerabilities": { "defcon1": 999, "critical": 999, "high": 999 }, "contents": { "defcon1": 999, "critical": 999, "high": 999 }, "checklists": { "defcon1": 999, "critical": 999, "high": 999 }}'
DSSC_INSECURE_SKIP_TLS_VERIFY: true
DSSC_INSECURE_SKIP_REGISTRY_TLS_VERIFY: true
name: Deep Security Smart Check Pipeline Example
on:
push:
branches:
- master
jobs:
Deep-Security-Smart-Check-Scan-Action:
runs-on: ubuntu-latest
steps:
- name: Deep Security Smart Check
run: |
docker run -v /var/run/docker.sock:/var/run/docker.sock deepsecurity/smartcheck-scan-action --image-name MYREGISTRY/MYIMAGE --smartcheck-host=DSSC_URL --smartcheck-user=DSSC_USER --smartcheck-password=DSSC_PASSSWORD --insecure-skip-tls-verify --insecure-skip-registry-tls-verify --image-pull-auth='{"aws":{"region":"us-east-1","accessKeyID":"'$AWS_ACCESS_KEY_ID'","secretAccessKey":"'$AWS_SECRET_ACCESS_KEY'"}}' --findings-threshold '{"malware": 100, "vulnerabilities": { "defcon1": 100, "critical": 100, "high": 100 }, "contents": { "defcon1": 100, "critical": 100, "high": 100 }, "checklists": { "defcon1": 100, "critical": 100, "high": 100 }}'
To enable pre-registry scanning, you will need to provide the
preregistry-scan
, preregistry-user
, and preregistry-password
parameters to
the scan. If you are running the temporary registry as a separate service or on
a port other than 5000, you will also need to provide the preregistry-host
parameter, specifying the hostname and port number where you are running the
temporary registry.
IMPORTANT: The pre-registry scan needs access to the Docker daemon through
the Docker socket, so if you are running the scan action as a container, make
sure to mount /var/run/docker.sock
. If you are using smartcheck-scan-action
as a GitHub Action, the runtime environment will do this step for you.
If you encounter a bug, think of a useful feature, or find something confusing in the docs, please create a new issue!
We ❤️ pull requests. If you'd like to fix a bug, contribute to a feature or just correct a typo, please feel free to do so.
If you're thinking of adding a new feature, consider opening an issue first to discuss it to ensure it aligns to the direction of the project (and potentially save yourself some time!).
Official support from Trend Micro is not available. Individual contributors may be Trend Micro employees, but are not official support.