Skip to content

Commit 868dda7

Browse files
committed
wip packaging poutine
1 parent b02b490 commit 868dda7

File tree

2 files changed

+50
-0
lines changed

2 files changed

+50
-0
lines changed
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
api_version: 1.0
2+
3+
id: boostsecurityio/poutine
4+
name: BoostSecurity Poutine
5+
namespace: boostsecurityio/Poutine
6+
scan_types:
7+
- sast
8+
9+
config:
10+
support_diff_scan: true
11+
require_full_repo: true
12+
13+
steps:
14+
- scan:
15+
command:
16+
docker:
17+
image: ghcr.io/boostsecurityio/poutine:0.15.2@sha256:f706446664a1988c6d33c70b00100442eb3c28eed694a450a50c641b5659c2d8
18+
command: analyze_local . --format sarif
19+
workdir: /src
20+
format: sarif
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
rules:
2+
injection:
3+
categories:
4+
- ALL
5+
- boost-baseline
6+
- boost-hardened
7+
- supply-chain
8+
- supply-chain-cicd-vulnerable-pipeline
9+
- supply-chain-cicd-severe-issues
10+
description: The pipeline contains an injection into bash or JavaScript with an expression that can contain user input. Prefer placing the expression in an environment variable instead of interpolating it directly into a script.
11+
name: injection
12+
group: supply-chain-cicd-vulnerable-pipeline
13+
pretty_name: Serialized AI model with malicious behavior
14+
ref: https://boostsecurityio.github.io/poutine/rules/injection/
15+
recommended: true
16+
untrusted_checkout_exec:
17+
categories:
18+
- ALL
19+
- boost-baseline
20+
- boost-hardened
21+
- supply-chain
22+
- supply-chain-cicd-vulnerable-pipeline
23+
- supply-chain-cicd-severe-issues
24+
description: The workflow appears to checkout untrusted code from a fork and uses a command that is known to allow code execution.
25+
name: untrusted_checkout_exec
26+
group: supply-chain-cicd-vulnerable-pipeline
27+
pretty_name: Arbitrary Code Execution from Untrusted Code Changes
28+
ref: https://boostsecurityio.github.io/poutine/rules/untrusted_checkout_exec/
29+
recommended: true
30+

0 commit comments

Comments
 (0)