🔒 Enhanced Security without Code Scanning
✅ Dependabot Configuration: - Automated dependency updates (weekly) - Security vulnerability alerts - GitHub Actions updates - Automatic PR creation for updates ✅ Enhanced Trivy Scanning: - Added secret scanning (credentials detection) - Added configuration scanning (misconfigurations) - Comprehensive security coverage ✅ Updated Security Policy: - Added Dependabot to security features - Added secret and configuration scanning - Professional security documentation �� Alternative to Code Scanning: - Dependabot for dependency security - Trivy for comprehensive scanning - No GitHub Advanced Security needed
This commit is contained in:
39
.github/dependabot.yml
vendored
Normal file
39
.github/dependabot.yml
vendored
Normal file
@@ -0,0 +1,39 @@
|
||||
version: 2
|
||||
updates:
|
||||
# Enable version updates for npm
|
||||
- package-ecosystem: "npm"
|
||||
directory: "/"
|
||||
schedule:
|
||||
interval: "weekly"
|
||||
day: "monday"
|
||||
time: "09:00"
|
||||
open-pull-requests-limit: 10
|
||||
reviewers:
|
||||
- "denshooter"
|
||||
assignees:
|
||||
- "denshooter"
|
||||
commit-message:
|
||||
prefix: "chore"
|
||||
include: "scope"
|
||||
labels:
|
||||
- "dependencies"
|
||||
- "security"
|
||||
|
||||
# Enable version updates for GitHub Actions
|
||||
- package-ecosystem: "github-actions"
|
||||
directory: "/"
|
||||
schedule:
|
||||
interval: "weekly"
|
||||
day: "monday"
|
||||
time: "09:00"
|
||||
open-pull-requests-limit: 5
|
||||
reviewers:
|
||||
- "denshooter"
|
||||
assignees:
|
||||
- "denshooter"
|
||||
commit-message:
|
||||
prefix: "chore"
|
||||
include: "scope"
|
||||
labels:
|
||||
- "github-actions"
|
||||
- "security"
|
||||
1
.github/workflows/ci-cd.yml
vendored
1
.github/workflows/ci-cd.yml
vendored
@@ -69,6 +69,7 @@ jobs:
|
||||
format: 'sarif'
|
||||
output: 'trivy-results.sarif'
|
||||
skip-version-check: true
|
||||
scanners: 'vuln,secret,config'
|
||||
|
||||
- name: Upload Trivy scan results to GitHub Security tab
|
||||
uses: github/codeql-action/upload-sarif@v3
|
||||
|
||||
@@ -14,11 +14,14 @@ This portfolio project follows semantic versioning and maintains security update
|
||||
This portfolio includes the following security measures:
|
||||
|
||||
- **Dependency Scanning**: Automated vulnerability scanning with Trivy
|
||||
- **Dependabot**: Automated dependency updates and security alerts
|
||||
- **Code Quality**: ESLint and TypeScript for secure code practices
|
||||
- **Authentication**: Basic Auth protection for admin routes
|
||||
- **Environment Security**: Sensitive data stored in environment variables
|
||||
- **HTTPS Only**: All production traffic encrypted
|
||||
- **Input Validation**: All user inputs are validated and sanitized
|
||||
- **Secret Scanning**: Trivy scans for exposed secrets and credentials
|
||||
- **Configuration Scanning**: Security misconfigurations detection
|
||||
|
||||
## Reporting a Vulnerability
|
||||
|
||||
|
||||
Reference in New Issue
Block a user