|
| 1 | +--- |
| 2 | +name: "ZAP Nightly Scan - Cornucopia Website" |
| 3 | + |
| 4 | +on: |
| 5 | + schedule: |
| 6 | + - cron: '30 0 * * *' |
| 7 | + workflow_dispatch: |
| 8 | + |
| 9 | +permissions: |
| 10 | + contents: write |
| 11 | + |
| 12 | +jobs: |
| 13 | + zap-scan: |
| 14 | + name: "OWASP ZAP DAST Scan - Website" |
| 15 | + runs-on: ubuntu-latest |
| 16 | + |
| 17 | + steps: |
| 18 | + - name: Checkout repository |
| 19 | + uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2 |
| 20 | + |
| 21 | + - name: Build website Docker image |
| 22 | + working-directory: cornucopia.owasp.org |
| 23 | + run: docker build -t cornucopia-website . |
| 24 | + |
| 25 | + - name: Start website container |
| 26 | + run: | |
| 27 | + docker run -d --name cornucopia-website -p 8080:80 cornucopia-website |
| 28 | + timeout 60 bash -c 'until curl -f http://localhost:8080 > /dev/null 2>&1; do sleep 2; done' |
| 29 | +
|
| 30 | + - name: Run ZAP Full Scan with AJAX Spider |
| 31 | + run: | |
| 32 | + mkdir -p zap-reports |
| 33 | + sudo chown 1000:1000 zap-reports |
| 34 | + docker run --network="host" \ |
| 35 | + --user 1000:1000 \ |
| 36 | + -v $(pwd)/zap-reports:/zap/wrk/:rw \ |
| 37 | + -t ghcr.io/zaproxy/zaproxy:2.16.1 \ |
| 38 | + zap-full-scan.py \ |
| 39 | + -t http://localhost:8080 \ |
| 40 | + -j \ |
| 41 | + -r website_dast_report.html \ |
| 42 | + -w website_dast_report.md \ |
| 43 | + -J website_dast_report.json \ |
| 44 | + -x website_dast_report.xml \ |
| 45 | + -a \ |
| 46 | + -d \ |
| 47 | + -z "-config ajaxSpider.maxDuration=10 -config scanner.maxScanDurationInMins=180" \ |
| 48 | + || true |
| 49 | +
|
| 50 | + - name: Stop website container |
| 51 | + if: always() |
| 52 | + run: | |
| 53 | + docker stop cornucopia-website || true |
| 54 | + docker rm cornucopia-website || true |
| 55 | +
|
| 56 | + - name: Upload ZAP reports as artifacts |
| 57 | + if: always() |
| 58 | + uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2 |
| 59 | + with: |
| 60 | + name: zap-website-dast-reports |
| 61 | + path: zap-reports/ |
| 62 | + retention-days: 30 |
| 63 | + |
| 64 | + - name: Check for high-risk vulnerabilities |
| 65 | + if: always() |
| 66 | + run: | |
| 67 | + if [ -f zap-reports/website_dast_report.json ]; then |
| 68 | + HIGH_RISK=$(jq '[.site[].alerts[] | select(.riskcode == "3")] | length' zap-reports/website_dast_report.json || echo "0") |
| 69 | + MEDIUM_RISK=$(jq '[.site[].alerts[] | select(.riskcode == "2")] | length' zap-reports/website_dast_report.json || echo "0") |
| 70 | + |
| 71 | + echo "High Risk Vulnerabilities: $HIGH_RISK" |
| 72 | + echo "Medium Risk Vulnerabilities: $MEDIUM_RISK" |
| 73 | + |
| 74 | + if [ "$HIGH_RISK" -gt "0" ]; then |
| 75 | + echo "⚠️ WARNING: $HIGH_RISK high-risk vulnerabilities detected!" |
| 76 | + echo "Please review the ZAP report for details." |
| 77 | + fi |
| 78 | + else |
| 79 | + echo "ZAP report not found, skipping vulnerability check" |
| 80 | + fi |
| 81 | +
|
| 82 | + - name: Upload reports to pre-release |
| 83 | + if: always() |
| 84 | + run: | |
| 85 | + for f in \ |
| 86 | + zap-reports/website_dast_report.html \ |
| 87 | + zap-reports/website_dast_report.json \ |
| 88 | + zap-reports/website_dast_report.xml \ |
| 89 | + zap-reports/website_dast_report.md; do |
| 90 | + if [ -f "$f" ]; then |
| 91 | + gh release upload "pre-release" "$f" --clobber |
| 92 | + fi |
| 93 | + done |
| 94 | + env: |
| 95 | + GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} |
0 commit comments