Skip to content

Instantly share code, notes, and snippets.

View sttor's full-sized avatar

Raushan Raj sttor

View GitHub Profile
@sttor
sttor / sast_article.md
Last active February 16, 2025 11:31
DevSecOps - Top Four OpenSource SAST tools for your CI/CD pipeline

DevSecOps - Top Four OpenSource SAST tools for your CI/CD pipeline

DevSecOps stands for Development, Security and Operations. DevSecOps involves introducing security practices and integrating tools earlier in the software development life cycle (SDLC), rather than treating security as a separate, post-development activity.

Static Application Security Testing (SAST) is one of the key security practices that can be integrated into DevSecOps. It is a type of security testing that analyzes the source code of an application to identify potential security vulnerabilities before the code is deployed. SAST tools scan the source code line by line, looking for security weaknesses such as buffer overflow, SQL injection, cross-site scripting (XSS), and other vulnerabilities that could be exploited by attackers. SAST can be done for a variety of programming languages, including C/C++, Java, Python, Ruby, and others. It can be integrated into a Continuous Integration/Continuous Deployment (CI/CD) pipeline, allowing de

import requests, json, os, time, sys
class SonarQubeReportSlack:
def __init__(self):
self.slack_token = os.getenv("slack_token")
self.fail_build = os.getenv("fail_build", "false")
self.component = os.getenv("component")
self.slack_channel = os.getenv("slack_channel")
self.sonar_url = os.getenv("sonar_url")
attempt_counter=0
max_attempts=20
echo "Starting .."
isUp() {
curl -s -u admin:admin -f "http://localhost:9000/api/system/info"
}
# Wait for server to be up
PING=`isUp`
while [ -z "$PING" ]
do
<h1>hello</h1>