Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
32 commits
Select commit Hold shift + click to select a range
fa48f5b
#1902 basic copy of zap scanner folder renamed to zap-automation-fram…
Ilyesbdlala Mar 18, 2024
9ea773e
#1902 Add deprecation notice to zap and zap-advanced
Ilyesbdlala Mar 18, 2024
18563e4
#1902 Add zap-automation-framework to ci and release-build
Ilyesbdlala Mar 18, 2024
4b4b158
#1902 Include zap-automation-framework in telemetry and persistence-…
Ilyesbdlala Mar 18, 2024
c875972
#1902 remove irrelevant examples to zap-automation-framework
Ilyesbdlala Mar 19, 2024
5cca2d1
#1902 re-generated updated zap and zap-advanced docs
Ilyesbdlala Mar 19, 2024
54cd593
#1902 Rename helm chart and parser name of ZAP-Automation-Framework
Ilyesbdlala Mar 19, 2024
e0637c8
#1902 Include a configmap template that includes all possible zap-au…
Ilyesbdlala Mar 19, 2024
e446a6c
#1902 Leave only zap-automation-framework scantype
Ilyesbdlala Mar 19, 2024
f3ff71d
#1902 Include a zap-baseline config to use in zap-automation-framework
Ilyesbdlala Mar 19, 2024
709f735
#1902 Update package name for parser-zap to parser-zap-automation-fra…
Ilyesbdlala Apr 9, 2024
cc22d42
#1902 Update parser image in Makefile to use own parser
Ilyesbdlala Apr 9, 2024
01d46e0
#1902 Renamed integration tests for zap-automation-framework
Ilyesbdlala Apr 9, 2024
da7ed5e
#1902 Added zap-automation-framework scan examples
Ilyesbdlala Apr 9, 2024
c9bfeda
#1902 Add documentation on how to migrate from zap and zap-advanced …
Ilyesbdlala Apr 9, 2024
b50e0ad
#1902 Regenerated docs
Ilyesbdlala Apr 9, 2024
9c7c1d0
#1902 Updated zap-automation-framework helm-unittest snapshot
Ilyesbdlala Apr 9, 2024
116c402
#1902 Replaced all occurences of OWASP ZAP to ZAP
Ilyesbdlala Apr 9, 2024
b97beb4
#1902 Removed configmap names prefix in zap-automation-framework
Ilyesbdlala Apr 9, 2024
392f161
Deleted old zap-advanced migration example
Ilyesbdlala Apr 9, 2024
7e80b0d
#1902 Improve deprecation notice wording
Ilyesbdlala Apr 9, 2024
4b95791
#1902 regenerated helm docs after merge conflict resolve
Ilyesbdlala May 8, 2024
9e8b0eb
#1902 Update import path for scan helper in zap-automation-framework …
Ilyesbdlala May 21, 2024
e3d5053
#1902 Fixed example scan name not fitting configmap name
Ilyesbdlala Jun 11, 2024
d3dcee8
#1902 Renamed examples to remove the unneeded word migrate
Ilyesbdlala Jun 11, 2024
359e996
#1902 use a consistent file name for automation configuration
Ilyesbdlala Jun 11, 2024
783c704
#1907 Refactor automation framework configMap file names for consistency
Ilyesbdlala Jun 11, 2024
7c54dbd
Apply suggestions from code review
Ilyesbdlala Jun 11, 2024
939923c
#1902 Removed OWASP keyword from ZAP Readme
Ilyesbdlala Jun 11, 2024
604e240
#1902 Update Helm unit test Snapshot
Ilyesbdlala Jun 11, 2024
826b5d9
#1902 Try to fix issue with config map names
J12934 Jun 26, 2024
8f241f7
Fix typo in bodgeit
J12934 Jun 26, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .github/workflows/ci.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -489,6 +489,7 @@ jobs:
- wpscan
- zap
- zap-advanced
- zap-automation-framework
steps:
- name: Checkout
uses: actions/checkout@v4
Expand Down
1 change: 1 addition & 0 deletions .github/workflows/release-build.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -346,6 +346,7 @@ jobs:
- whatweb
- wpscan
- zap
- zap-automation-framework

steps:
- name: Checkout
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ public enum ScanNameMapping {
ZAP_FULL_SCAN("zap-full-scan", ScanType.ZAP_SCAN),
ZAP_ADVANCED_SCAN("zap-advanced-scan", ScanType.ZAP_SCAN),
ZAP_AUTOMATION_SCAN("zap-automation-scan", ScanType.ZAP_SCAN),
ZAP_AUTOMATION_FRAMEWORK("zap-automation-framework", ScanType.ZAP_SCAN),
SSLYZE("sslyze", ScanType.SSLYZE_SCAN),
TRIVY_IMAGE("trivy-image", ScanType.TRIVY_SCAN),
TRIVY_IMAGE_AUTODISCOVERY("trivy-image-autodiscovery", ScanType.TRIVY_SCAN),
Expand Down
59 changes: 30 additions & 29 deletions operator/internal/telemetry/telemetry.go
Original file line number Diff line number Diff line change
Expand Up @@ -24,35 +24,36 @@ var telemetryInterval = 24 * time.Hour
// officialScanTypes contains the list of official secureCodeBox Scan Types.
// Unofficial Scan Types should be reported as "other" to avoid leakage of confidential data via the scan-types name
var officialScanTypes map[string]bool = map[string]bool{
"amass": true,
"cmseek": true,
"doggo": true,
"ffuf": true,
"git-repo-scanner": true,
"gitleaks": true,
"kube-hunter": true,
"kubeaudit": true,
"ncrack": true,
"nikto": true,
"nmap": true,
"nuclei": true,
"screenshooter": true,
"semgrep": true,
"ssh-audit": true,
"ssh-scan": true,
"sslyze": true,
"trivy-image": true,
"trivy-filesystem": true,
"trivy-repo": true,
"trivy-sbom-image": true,
"typo3scan": true,
"whatweb": true,
"wpscan": true,
"zap-baseline-scan": true,
"zap-api-scan": true,
"zap-full-scan": true,
"zap-automation-scan": true,
"zap-advanced-scan": true,
"amass": true,
"cmseek": true,
"doggo": true,
"ffuf": true,
"git-repo-scanner": true,
"gitleaks": true,
"kube-hunter": true,
"kubeaudit": true,
"ncrack": true,
"nikto": true,
"nmap": true,
"nuclei": true,
"screenshooter": true,
"semgrep": true,
"ssh-audit": true,
"ssh-scan": true,
"sslyze": true,
"trivy-image": true,
"trivy-filesystem": true,
"trivy-repo": true,
"trivy-sbom-image": true,
"typo3scan": true,
"whatweb": true,
"wpscan": true,
"zap-baseline-scan": true,
"zap-api-scan": true,
"zap-full-scan": true,
"zap-automation-scan": true,
"zap-automation-framework": true,
"zap-advanced-scan": true,
}

// telemetryData submitted by operator
Expand Down
7 changes: 5 additions & 2 deletions scanners/zap-advanced/.helm-docs.gotmpl
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,9 @@ usecase: "WebApp & OpenAPI Vulnerability Scanner extend with authentication feat

{{- define "extra.chartAboutSection" -}}
## What is ZAP?
:::caution Deprecation Notice
The `zap-advanced` and `zap` ScanType are being deprecated in favor of the `zap-automation-framework`, which encompasses all functionalities of the previous ScanTypes. We recommend transitioning to the "zap-automation-framework" as soon as possible. `zap-advanced` and `zap` ScanTypes will be removed in the upcoming v5 release. For guidance on migrating to "zap-automation-framework," please refer to [migration to zap-automation framework](/docs/scanners/zap-automation-framework#migration-to-zap-automation-framework).
:::

The Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing.

Expand Down Expand Up @@ -57,7 +60,7 @@ optional arguments:
-o OUTPUT_FOLDER, --output-folder OUTPUT_FOLDER
The path to a local folder used to store the output files, eg. the ZAP Report or logfiles.
-r XML,XML-plus,JSON,JSON-plus,HTML,HTML-plus,MD, --report-type XML,XML-plus,JSON,JSON-plus,HTML,HTML-plus,MD
The ZAP Report Type.
The ZAP Report Type.
```
{{- end }}

Expand Down Expand Up @@ -88,7 +91,7 @@ Additionally, there will be some ZAP Scripts included, these are stored in the c
│This CM contains ZAP session │ │ ▼ │ │A YAML configuration for ZAP that │
│scripts that are already included │ │ │ ┌───────────────────┐ │ │ │relates to a single scan execution. │
│within the zap-advanced scanner. │ │ │ │ │ │- can by used for selected scans │
│Feel free to add your own. │────────┼─────┼─▶│ ZAP Proxy │ │ │- not created by default │
│Feel free to add your own. │────────┼─────┼─▶│ ZAP Proxy │ │ │- not created by default │
│ │ │ │ │ └───────│- add your scan target specific config │
│ConfigMap: zap-scripts-session │ │ │ └───────────────────┘ │ │- needs to be referenced in Scan │
└──────────────────────────────────────┘ │ │- please use SecretMap for credentials! │
Expand Down
7 changes: 5 additions & 2 deletions scanners/zap-advanced/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,9 @@ Otherwise your changes will be reverted/overwritten automatically due to the bui
</p>

## What is ZAP?
:::caution Deprecation Notice
The `zap-advanced` and `zap` ScanType are being deprecated in favor of the `zap-automation-framework`, which encompasses all functionalities of the previous ScanTypes. We recommend transitioning to the "zap-automation-framework" as soon as possible. `zap-advanced` and `zap` ScanTypes will be removed in the upcoming v5 release. For guidance on migrating to "zap-automation-framework," please refer to [migration to zap-automation framework](/docs/scanners/zap-automation-framework#migration-to-zap-automation-framework).
:::

The Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing.

Expand Down Expand Up @@ -73,7 +76,7 @@ optional arguments:
-o OUTPUT_FOLDER, --output-folder OUTPUT_FOLDER
The path to a local folder used to store the output files, eg. the ZAP Report or logfiles.
-r XML,XML-plus,JSON,JSON-plus,HTML,HTML-plus,MD, --report-type XML,XML-plus,JSON,JSON-plus,HTML,HTML-plus,MD
The ZAP Report Type.
The ZAP Report Type.
```

## Requirements
Expand Down Expand Up @@ -106,7 +109,7 @@ Additionally, there will be some ZAP Scripts included, these are stored in the c
│This CM contains ZAP session │ │ ▼ │ │A YAML configuration for ZAP that │
│scripts that are already included │ │ │ ┌───────────────────┐ │ │ │relates to a single scan execution. │
│within the zap-advanced scanner. │ │ │ │ │ │- can by used for selected scans │
│Feel free to add your own. │────────┼─────┼─▶│ ZAP Proxy │ │ │- not created by default │
│Feel free to add your own. │────────┼─────┼─▶│ ZAP Proxy │ │ │- not created by default │
│ │ │ │ │ └───────│- add your scan target specific config │
│ConfigMap: zap-scripts-session │ │ │ └───────────────────┘ │ │- needs to be referenced in Scan │
└──────────────────────────────────────┘ │ │- please use SecretMap for credentials! │
Expand Down
7 changes: 5 additions & 2 deletions scanners/zap-advanced/docs/README.ArtifactHub.md
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,9 @@ The secureCodeBox project is running on [Kubernetes](https://kubernetes.io/). To
You can find resources to help you get started on our [documentation website](https://www.securecodebox.io) including instruction on how to [install the secureCodeBox project](https://www.securecodebox.io/docs/getting-started/installation) and guides to help you [run your first scans](https://www.securecodebox.io/docs/getting-started/first-scans) with it.

## What is ZAP?
:::caution Deprecation Notice
The `zap-advanced` and `zap` ScanType are being deprecated in favor of the `zap-automation-framework`, which encompasses all functionalities of the previous ScanTypes. We recommend transitioning to the "zap-automation-framework" as soon as possible. `zap-advanced` and `zap` ScanTypes will be removed in the upcoming v5 release. For guidance on migrating to "zap-automation-framework," please refer to [migration to zap-automation framework](/docs/scanners/zap-automation-framework#migration-to-zap-automation-framework).
:::

The Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing.

Expand Down Expand Up @@ -78,7 +81,7 @@ optional arguments:
-o OUTPUT_FOLDER, --output-folder OUTPUT_FOLDER
The path to a local folder used to store the output files, eg. the ZAP Report or logfiles.
-r XML,XML-plus,JSON,JSON-plus,HTML,HTML-plus,MD, --report-type XML,XML-plus,JSON,JSON-plus,HTML,HTML-plus,MD
The ZAP Report Type.
The ZAP Report Type.
```

## Requirements
Expand Down Expand Up @@ -111,7 +114,7 @@ Additionally, there will be some ZAP Scripts included, these are stored in the c
│This CM contains ZAP session │ │ ▼ │ │A YAML configuration for ZAP that │
│scripts that are already included │ │ │ ┌───────────────────┐ │ │ │relates to a single scan execution. │
│within the zap-advanced scanner. │ │ │ │ │ │- can by used for selected scans │
│Feel free to add your own. │────────┼─────┼─▶│ ZAP Proxy │ │ │- not created by default │
│Feel free to add your own. │────────┼─────┼─▶│ ZAP Proxy │ │ │- not created by default │
│ │ │ │ │ └───────│- add your scan target specific config │
│ConfigMap: zap-scripts-session │ │ │ └───────────────────┘ │ │- needs to be referenced in Scan │
└──────────────────────────────────────┘ │ │- please use SecretMap for credentials! │
Expand Down
5 changes: 4 additions & 1 deletion scanners/zap-advanced/docs/README.DockerHub-Scanner.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,9 @@ docker pull securecodebox/scanner-zap-advanced
```

## What is ZAP?
:::caution Deprecation Notice
The `zap-advanced` and `zap` ScanType are being deprecated in favor of the `zap-automation-framework`, which encompasses all functionalities of the previous ScanTypes. We recommend transitioning to the "zap-automation-framework" as soon as possible. `zap-advanced` and `zap` ScanTypes will be removed in the upcoming v5 release. For guidance on migrating to "zap-automation-framework," please refer to [migration to zap-automation framework](/docs/scanners/zap-automation-framework#migration-to-zap-automation-framework).
:::

The Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing.

Expand Down Expand Up @@ -81,7 +84,7 @@ optional arguments:
-o OUTPUT_FOLDER, --output-folder OUTPUT_FOLDER
The path to a local folder used to store the output files, eg. the ZAP Report or logfiles.
-r XML,XML-plus,JSON,JSON-plus,HTML,HTML-plus,MD, --report-type XML,XML-plus,JSON,JSON-plus,HTML,HTML-plus,MD
The ZAP Report Type.
The ZAP Report Type.
```

## Community
Expand Down
5 changes: 5 additions & 0 deletions scanners/zap-automation-framework/.gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# SPDX-FileCopyrightText: the secureCodeBox authors
#
# SPDX-License-Identifier: Apache-2.0

*.tar
Loading