huskyCI
huskyCI is an open-source tool that performs security tests inside CI pipelines of multiple projects and centralizes all results into a database for further analysis and metrics.
How does it work?
The main goal of this project is to help development teams improve the quality of their code by finding vulnerabilities as soon as possible.
huskyCI can perform static security analysis in Python (Bandit and Safety), Ruby (Brakeman), JavaScript (Npm Audit) and Golang (Gosec). You should check our wiki to better understand how this tool could help securing your organization projects!
Requirements
Docker and Docker-Compose
The easiest way to deploy huskyCI locally is by using [Docker][Docker Install] and [Docker Compose][Docker Compose Install], thus you should have them installed on your machine.
Golang
You must also have Go installed and huskyCI needs to be inside your $GOPATH to run properly.
Installing
After cloning this repository, simply run the command inside huskyCI's folder:
make install
Running
After installing, an .env
file with instructions to huskyCI should be generated:
$ cat .env
export HUSKYCI_CLIENT_REPO_URL="https://github.com/globocom/huskyCI.git"
export HUSKYCI_CLIENT_REPO_BRANCH="vulns-Golang"
export HUSKYCI_CLIENT_API_ADDR="http://localhost:8888"
export HUSKYCI_CLIENT_API_USE_HTTPS="false"
export HUSKYCI_CLIENT_TOKEN="{YOUR_TOKEN_HERE}"
You can change the repository and branch being analysed by modifying the contents of HUSKYCI_CLIENT_REPO_URL
and HUSKYCI_CLIENT_REPO_BRANCH
. Then simply source it through the command:
. .env
Mac OS:
make run-client
Linux:
make run-client-linux