Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion hooks/finding-post-processing/.helm-docs.gotmpl
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ which can be used to add or update fields from your findings meeting specified c

### Rule Configuration
The _rules_ can be defined in the `values` of the HelmChart.
The syntax and semantic for these rules are quite similar to CascadingRules (See: [secureCodeBox | CascadingRules](/docs/api/crds/cascading-rule))
The syntax and semantic for these rules are quite similar to CascadingRules (See: [secureCodeBox | CascadingRules](https://www.securecodebox.io/docs/api/crds/cascading-rule))

To define rules you will have to provide the `rules` field with one or more `matches` elements.
Each `machtes` defines one Rule.
Expand Down
2 changes: 1 addition & 1 deletion hooks/finding-post-processing/docs/README.ArtifactHub.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ Kubernetes: `>=v1.11.0-0`

### Rule Configuration
The _rules_ can be defined in the `values` of the HelmChart.
The syntax and semantic for these rules are quite similar to CascadingRules (See: [secureCodeBox | CascadingRules](/docs/api/crds/cascading-rule))
The syntax and semantic for these rules are quite similar to CascadingRules (See: [secureCodeBox | CascadingRules](https://www.securecodebox.io/docs/api/crds/cascading-rule))

To define rules you will have to provide the `rules` field with one or more `matches` elements.
Each `machtes` defines one Rule.
Expand Down
4 changes: 2 additions & 2 deletions hooks/notification/.helm-docs.gotmpl
Original file line number Diff line number Diff line change
Expand Up @@ -106,7 +106,7 @@ This means that you can define key-value pairs as well as providing envs via sec
#### Rule Configuration

The rules can be defined in the values of the Chart.
The syntax and semantic for these rules are quite similar to CascadingRules (See: [secureCodeBox | CascadingRules](/docs/api/crds/cascading-rule))
The syntax and semantic for these rules are quite similar to CascadingRules (See: [secureCodeBox | CascadingRules](https://www.securecodebox.io/docs/api/crds/cascading-rule))
To define Rules you will have to provide the `rules` field with one or more `matches` elements.
Each `matches` defines one Rule.
For example:
Expand Down Expand Up @@ -449,4 +449,4 @@ To fill your template with data we provide the following objects.
{{- end }}

{{- define "extra.scannerLinksSection" -}}
{{- end }}
{{- end }}
2 changes: 1 addition & 1 deletion hooks/notification/docs/README.ArtifactHub.md
Original file line number Diff line number Diff line change
Expand Up @@ -133,7 +133,7 @@ This means that you can define key-value pairs as well as providing envs via sec
#### Rule Configuration

The rules can be defined in the values of the Chart.
The syntax and semantic for these rules are quite similar to CascadingRules (See: [secureCodeBox | CascadingRules](/docs/api/crds/cascading-rule))
The syntax and semantic for these rules are quite similar to CascadingRules (See: [secureCodeBox | CascadingRules](https://www.securecodebox.io/docs/api/crds/cascading-rule))
To define Rules you will have to provide the `rules` field with one or more `matches` elements.
Each `matches` defines one Rule.
For example:
Expand Down
2 changes: 1 addition & 1 deletion scanners/git-repo-scanner/.helm-docs.gotmpl
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ usecase: "Discover Git repositories"
## What is Git-Repo-Scanner?

Git-Repo-Scanner is a small Python script which discovers repositories on GitHub or GitLab. The main purpose of this scanner
is to provide a cascading input for the [gitleaks](/docs/scanners/gitleaks) and [semgrep](/docs/scanners/semgrep) scanners.
is to provide a cascading input for the [gitleaks](https://www.securecodebox.io/docs/scanners/gitleaks) and [semgrep](https://www.securecodebox.io/docs/scanners/semgrep) scanners.
{{- end }}

{{- define "extra.scannerConfigurationSection" -}}
Expand Down
2 changes: 1 addition & 1 deletion scanners/git-repo-scanner/docs/README.ArtifactHub.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ You can find resources to help you get started on our [documentation website](ht
## What is Git-Repo-Scanner?

Git-Repo-Scanner is a small Python script which discovers repositories on GitHub or GitLab. The main purpose of this scanner
is to provide a cascading input for the [gitleaks](/docs/scanners/gitleaks) and [semgrep](/docs/scanners/semgrep) scanners.
is to provide a cascading input for the [gitleaks](https://www.securecodebox.io/docs/scanners/gitleaks) and [semgrep](https://www.securecodebox.io/docs/scanners/semgrep) scanners.

## Deployment
The git-repo-scanner chart can be deployed via helm:
Expand Down
2 changes: 1 addition & 1 deletion scanners/git-repo-scanner/docs/README.DockerHub-Parser.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ docker pull securecodebox/parser-git-repo-scanner
## What is Git-Repo-Scanner?

Git-Repo-Scanner is a small Python script which discovers repositories on GitHub or GitLab. The main purpose of this scanner
is to provide a cascading input for the [gitleaks](/docs/scanners/gitleaks) and [semgrep](/docs/scanners/semgrep) scanners.
is to provide a cascading input for the [gitleaks](https://www.securecodebox.io/docs/scanners/gitleaks) and [semgrep](https://www.securecodebox.io/docs/scanners/semgrep) scanners.

## Community

Expand Down
2 changes: 1 addition & 1 deletion scanners/git-repo-scanner/docs/README.DockerHub-Scanner.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ docker pull securecodebox/scanner-git-repo-scanner
## What is Git-Repo-Scanner?

Git-Repo-Scanner is a small Python script which discovers repositories on GitHub or GitLab. The main purpose of this scanner
is to provide a cascading input for the [gitleaks](/docs/scanners/gitleaks) and [semgrep](/docs/scanners/semgrep) scanners.
is to provide a cascading input for the [gitleaks](https://www.securecodebox.io/docs/scanners/gitleaks) and [semgrep](https://www.securecodebox.io/docs/scanners/semgrep) scanners.

## Scanner Configuration

Expand Down
4 changes: 2 additions & 2 deletions scanners/semgrep/.helm-docs.gotmpl
Original file line number Diff line number Diff line change
Expand Up @@ -89,8 +89,8 @@ Due to the large variety of options, we do not provide documentation for all of
Refer to the linked documentation for details on the different methods, and remember to use [Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret/) to manage keys and tokens.

## Cascading Rules
By default, the semgrep scanner does not install any [cascading rules](/docs/hooks/cascading-scans), as some aspects of the semgrep scan (like the used ruleset) should be customized.
However, you can easily create your own cascading rule, for example to run semgrep on the output of [git-repo-scanner](/docs/scanners/git-repo-scanner).
By default, the semgrep scanner does not install any [cascading rules](https://www.securecodebox.io/docs/hooks/cascading-scans), as some aspects of the semgrep scan (like the used ruleset) should be customized.
However, you can easily create your own cascading rule, for example to run semgrep on the output of [git-repo-scanner](https://www.securecodebox.io/docs/scanners/git-repo-scanner).
As a starting point, consider the following cascading rule to scan all public GitHub repositories found by git-repo-scanner using the p/ci ruleset of semgrep:

```yaml
Expand Down
4 changes: 2 additions & 2 deletions scanners/semgrep/docs/README.ArtifactHub.md
Original file line number Diff line number Diff line change
Expand Up @@ -108,8 +108,8 @@ Due to the large variety of options, we do not provide documentation for all of
Refer to the linked documentation for details on the different methods, and remember to use [Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret/) to manage keys and tokens.

## Cascading Rules
By default, the semgrep scanner does not install any [cascading rules](/docs/hooks/cascading-scans), as some aspects of the semgrep scan (like the used ruleset) should be customized.
However, you can easily create your own cascading rule, for example to run semgrep on the output of [git-repo-scanner](/docs/scanners/git-repo-scanner).
By default, the semgrep scanner does not install any [cascading rules](https://www.securecodebox.io/docs/hooks/cascading-scans), as some aspects of the semgrep scan (like the used ruleset) should be customized.
However, you can easily create your own cascading rule, for example to run semgrep on the output of [git-repo-scanner](https://www.securecodebox.io/docs/scanners/git-repo-scanner).
As a starting point, consider the following cascading rule to scan all public GitHub repositories found by git-repo-scanner using the p/ci ruleset of semgrep:

```yaml
Expand Down