-
Notifications
You must be signed in to change notification settings - Fork 60
add rapidast config and instruction to run it #1054
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,26 @@ | ||
| # RapidAST Security Scanning | ||
|
|
||
| Run automated security scans against OpenShift APIs using RapidAST container. | ||
|
|
||
| ## Quick Start | ||
|
|
||
| ```bash | ||
| # Pull the container | ||
| podman pull quay.io/redhatproductsecurity/rapidast:latest | ||
|
|
||
| # Create results directory | ||
| mkdir -p results | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Running the following podman command as is results in: I had a look at the respective docs. They reference running
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Maybe I am a mac user (same as Pratik?), the exact command works for me.
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. NIT: Could we add |
||
|
|
||
| # Run security scan | ||
| podman run --rm \ | ||
| -v $(pwd)/rapidast-config.yaml:/tmp/config.yaml \ | ||
| -v $(pwd)/results:/opt/rapidast/results \ | ||
| quay.io/redhatproductsecurity/rapidast:latest \ | ||
| --config /tmp/config.yaml | ||
|
Comment on lines
+15
to
+19
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Running the command as is results in (with a modified I had a look at the respective docs. They reference the usage of
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Note: We can omit the |
||
| ``` | ||
|
|
||
| ## Configuration | ||
|
|
||
| - `rapidast-config.yaml`: Scan configuration for OpenShift upgrades API | ||
| - Disables only cookie/session rules (appropriate for stateless APIs) | ||
| - Uses passive scanning (safe for production) | ||
| Original file line number | Diff line number | Diff line change | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| @@ -0,0 +1,37 @@ | ||||||||||||
| # RapidAST Configuration for OpenShift Upgrades API Security Scanning | ||||||||||||
| # This configuration is optimized for stateless REST APIs | ||||||||||||
| # - Uses passive scanning (safe for production) | ||||||||||||
| # - Disables only cookie/session rules (not applicable to stateless APIs) | ||||||||||||
| # - Provides comprehensive security coverage | ||||||||||||
|
|
||||||||||||
| config: | ||||||||||||
| configVersion: 6 | ||||||||||||
|
|
||||||||||||
| # Application configuration | ||||||||||||
| application: | ||||||||||||
| shortName: "openshift-upgrades-api" # Display name for reports | ||||||||||||
| url: "https://api.stage.openshift.com" # Base URL (without path) stage as example | ||||||||||||
|
|
||||||||||||
| # General settings | ||||||||||||
| general: | ||||||||||||
| # No authentication required for the public API | ||||||||||||
| # For authenticated APIs, add oauth2_rtoken, http_basic, etc. | ||||||||||||
|
|
||||||||||||
| # Scanner configurations | ||||||||||||
| scanners: | ||||||||||||
| zap: # OWASP ZAP scanner | ||||||||||||
| # OpenAPI specification-based scanning | ||||||||||||
| apiScan: | ||||||||||||
| apis: | ||||||||||||
| apiUrl: "https://api.stage.openshift.com/api/upgrades_info/openapi" | ||||||||||||
|
|
||||||||||||
| # Passive scanning rules (analyzes traffic without active attacks) | ||||||||||||
| passiveScan: | ||||||||||||
| # Disabled rules appropriate for stateless APIs: | ||||||||||||
| # 10054: Cookie without SameSite Attribute (not applicable) | ||||||||||||
| # 10112: Session Management Response Identified (not applicable) | ||||||||||||
| disabledRules: "10054,10112" | ||||||||||||
|
|
||||||||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Note: I have quickly found out that html reports are supported! Could we add them as a format for a human-readable output? Although that may depend on how the configuration is to be consumed, which is not clear to me at the moment.
Suggested change
|
||||||||||||
| # Additional ZAP extensions | ||||||||||||
| miscOptions: | ||||||||||||
| additionalAddons: "ascanrulesBeta" # Beta active scan rules | ||||||||||||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. What is I cannot tell the difference either in the generated report without |
||||||||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
NIT: to keep consistent with last section in the page.