Either:
wget 'https://secguro.github.io/secguro-cli/secguro'
chmod +x secguro
$PATH
; e.g. mv secguro ~/.local/bin
secguro scan [path]
- name: Check for Secguro Violations
run: wget 'https://secguro.github.io/secguro-cli/secguro' && chmod +x secguro && SECGURO_CI_TOKEN="GET THIS TOKEN FROM THE SECGURO WEBAPP" ./secguro scan
- task: CmdLine@2
displayName: Check for Secguro Violations
inputs:
script: wget 'https://secguro.github.io/secguro-cli/secguro' && chmod +x secguro && SECGURO_CI_TOKEN="GET THIS TOKEN FROM THE SECGURO WEBAPP" ./secguro scan
workingDirectory: .
failOnStderr: false # because wget writes to stderr
secguro fix [path]
Exit codes ranging from 0 to 250 (inclusive) indicate the number of findings. Exit code 250 indicates 250 or more findings. Ignored findings are not counted.
Exit codes not equal to 0 are useful to make Github Workflows and Azure Pipelines fail.
Switch --tolerance n
(or --tolerance=n
) may be used to make secguro yield exit code 0 if the number of findigs does not exceed n
.
$ secguro scan --help
NAME:
secguro scan - scan for problems
USAGE:
secguro scan [command options] [arguments...]
OPTIONS:
--git set to scan git history and print commit information (default: false)
--disabled-detectors value [ --disabled-detectors value ] list of detectors to disable (semgrep,gitleaks,dependencycheck)
--format value text or json (default: "text")
--output value, -o value path to output destination
--tolerance value number of findings to tolerate when choosing exit code (default: 0)
--help, -h show help
$ secguro fix --help
NAME:
secguro fix - scan for problems and then switch to an interactive mode to fix them
USAGE:
secguro fix [command options] [arguments...]
OPTIONS:
--git set to scan git history and print commit information (default: false)
--disabled-detectors value [ --disabled-detectors value ] list of detectors to disable (semgrep,gitleaks,dependencycheck)
--help, -h show help
yay -S golangci-lint
or https://golangci-lint.run/usage/install/#local-installationmake lint
git config core.hooksPath hooks
To generate a binary that communicates with the CD server, run:
make
For a developer build that communicates with localhost, run:
make compile-dev
Location of the generated binary: build/secguro