Skip to content

Static Application Security Testing (SAST) Toolset

Notifications You must be signed in to change notification settings

get-wright/x-scan

Repository files navigation

X-Scan Toolset

This project provides a containerized security scanning pipeline that runs multiple security analysis tools against your codebase.

🛡️ Included Scanners

  • Semgrep: Static analysis for finding code patterns and security issues
  • Gitleaks: Secret and credential scanning
  • Trivy: Vulnerability and misconfiguration scanning
  • Checkov: Infrastructure-as-Code security scanning
  • Kubescape: Kubernetes security risk analysis

⚙️ Configuration

Configure the scanning environment in the .env

SEMGREP_TOKEN=<your-semgrep-token>
SCAN_PATH=<path-to-code-to-scan>
RULES_PATH=<path-to-custom-rules>
TRIVY_SEVERITY=HIGH,CRITICAL
TRIVY_SCANNERS=vuln,misconfig,secret

🚀 Running Scans

  1. Make sure you have Docker and Docker Compose installed

  2. To run X-Scan, interact with main.py :

.\main.py --help

This option should run trivy and show the log of it in the CLI

📝 Custom Rules

The project includes two Semgrep rule repositories as Git submodules:

  • semgrep-rules-modified

  • semgrep-rules-trail-of-bits

Initialize the rule submodules:

git submodule update --init

🔧 Advanced Configuration

Each scanner is configurable through environment variables and volume mounts in docker-compose.yml. The scan scripts in scripts folder.

About

Static Application Security Testing (SAST) Toolset

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published