Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Installing SNYK mutation tool for Static Analysis #47

Closed
wants to merge 55 commits into from

Conversation

fdounis
Copy link

@fdounis fdounis commented Oct 27, 2024

PR integrates Snyk into our CI/CD pipeline as a static analysis tool for identifying known vulnerabilities in our dependencies. Snyk scans the project’s node_modules for any security issues, giving us insights into outdated or vulnerable packages and providing remediation suggestions.

Why Snyk?

  • Security: Snyk provides a comprehensive vulnerability database that enables early detection of risks in project dependencies.
  • Automation: By running Snyk in GitHub Actions, we automate security checks on every push or pull request to the main branch, improving our codebase’s resilience against known threats.
  • Visibility: Snyk gives actionable insights into vulnerability severity (High, Medium, Low), with guidance on fixing the issues detected.

Workflow Details:

The Snyk Vulnerability Scan workflow is triggered on each push to main and for every pull request targeting main.
Snyk will authenticate using a SNYK_TOKEN stored in GitHub Secrets, ensuring secure access.

The scan output provides a detailed list of vulnerabilities and potential fixes, allowing the team to prioritize remediation based on severity.

Steps Included:

  1. Installed Snyk using npm and added it as a dev dependency.
  2. Created a GitHub Actions workflow (snyk-analysis.yml) to run Snyk scans in our CI/CD pipeline.
image 3. Configured Snyk to authenticate via a GitHub secret token and to scan all project dependencies. Screenshot 2024-10-27 at 8 03 21 PM

Output Details:

Snyk will generate a report listing detected vulnerabilities with links to additional information on each issue.

Each finding includes:

  • Severity: High, Medium, Low
  • Dependency Path: The specific path and version of the vulnerable dependency
  • Fix Recommendation: Any available patches or upgrades to address the vulnerability
image image

T7alabdullah and others added 30 commits September 10, 2024 13:16
Merged my Proj1 Edits -nalseaf
Merged project 1 to project 2 -- sarrakhelfi
mthani2 and others added 25 commits October 1, 2024 16:36
…reaction instead of /post/3/reaction when button is clicked
…folder, with the server-side logic for handling reactions
…est/back-end directory. This file will house all tests related to the emoji reactions API endpoints.
…ccessfully added to a post. This ensures that the POST /api/post/:postId/reaction endpoint functions correctly under normal conditions
…actions. Attempting to add a reaction that is not among the predefined valid emojis (👍, ❤️, 😂) should result in a 400 Bad Request response with an appropriate error message.
…actions. The API should respond with a 403 Forbidden status and an appropriate error message when a user who is not logged in attempts to add a reaction.
… errors during reaction addition. Simulate a database error and verify that the API responds with a 500 Internal Server Error and an appropriate error message.
@fdounis fdounis closed this Oct 27, 2024
@fdounis fdounis deleted the snyk-tool-integration branch October 27, 2024 17:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants