
Security News
How Enterprise Security Is Adapting to AI-Accelerated Threats
Socket CTO Ahmad Nassri discusses why supply chain attacks now target developer machines and what AI means for the future of enterprise security.
gitlab.com/gitlab-org/security-products/analyzers/common/v2
Advanced tools
This repository contains Go packages you may use to create analyzers.
Several of the common submodules are deprecated in their current form, instead with the work in GitLab#211819
it is recommended to use the following dedicated modules:
analyzers/command - the command interface (replacing common/command)analyzers/report - Report and Finding structs for marshalling JSON reports (replacing common/issue)analyzers/template - template project for new analyzers (replacing common/template)This project is in maintenance mode. As we transition away from a centralized module and towards separate projects, any future improvements should take into consideration whether the affected module should be extracted. In their current state, many of the modules are considered feature-complete and do not require updates, thereby not requiring extraction. This list includes the following modules:
common/cacertcommon/logutilcommon/pathfiltercommon/plugincommon/searchcommon/walkThe default logging level is set to "info". You can control the level at which our logs are output by setting
the SECURE_LOG_LEVEL env var to one of the following string values:
panicfatalerrorwarninfodebugtraceSetting the log level allows that level and the other levels above it to output into the log. For example, "panic" is the most restrictive setting and "trace" the most permissive. If you were to set it to "error", then it would only output error, fatal, and panic level logs.
Analyzers are shipped as Docker images. All analyzers based on this library can be used the same way. Here's an example using the spotbugs Docker image:
cd into the directory of the source code you want to scan
Run the Docker image:
docker run \
--interactive --tty --rm \
--volume "$PWD":/tmp/app \
--env CI_PROJECT_DIR=/tmp/app \
registry.gitlab.com/gitlab-org/security-products/analyzers/spotbugs:${VERSION:-2} /analyzer run
VERSION must be replaced with one of the available releases, see versioning.
The Docker container generates a report in the mounted project directory with a report filename corresponding to the analyzer category:
| Analyzer Category | Report Filename |
|---|---|
| SAST | gl-sast-report.json |
| Secret Detection | gl-secret-detection-report.json |
| Dependency Scanning | gl-dependency-scanning-report.json |
To update the analyzer:
Here's how to create a Docker image named analyzer:
GOOS=linux go build -o analyzer
docker build -t analyzer.
docker run --rm \
--volume "$PWD"/test/fixtures:/tmp/project \
--env CI_PROJECT_DIR=/tmp/project \
analyzer \
/analyzer run
Then you can test it:
for SAST analyzers:
wget https://gitlab.com/gitlab-org/security-products/ci-templates/-/raw/master/scripts/compare_reports.sh
sh ./compare_reports.sh sast test/fixtures/gl-sast-report.json test/expect/gl-sast-report.json \
| patch -Np1 test/expect/gl-sast-report.json && git commit -m 'Update expectation' test/expect/gl-sast-report.json
rm compare_reports.sh
for Secret Detection:
wget https://gitlab.com/gitlab-org/security-products/ci-templates/-/raw/master/scripts/compare_reports.sh
sh ./compare_reports.sh sd test/fixtures/gl-secret-detection-report.json test/expect/gl-secret-detection-report.json \
| patch -Np1 test/expect/gl-secret-detection-report.json && git commit -m 'Update expectation' test/expect/gl-secret-detection-report.json
rm compare_reports.sh
for Dependency Scanning analyzers:
wget https://gitlab.com/gitlab-org/security-products/ci-templates/-/raw/master/scripts/compare_reports.sh
sh ./compare_reports.sh ds test/fixtures/gl-dependency-scanning-report.json test/expect/gl-dependency-scanning.json
| patch -Np1 test/expect/gl-dependency-scanning-report.json && git commit -m 'Update expectation' test/expect/gl-dependency-scanning-report.json
rm compare_reports.sh
You can also compile the binary for your own environment and run it locally
but analyze and run probably won't work
since the runtime dependencies of the analyzer are missing.
Here's an illustration based on find-sec-bugs:
go build -o analyzer
./analyzer search test/fixtures
./analyzer convert test/fixtures/app/spotbugsXml.Xml > ./gl-sast-report.json
If you want to test local changes in common from an analyzer you can do this by using the go mod replace command so that it loads common with your local changes instead of using the version of common that has been tagged remotely. Ex:
go mod edit -replace gitlab.com/gitlab-org/security-products/analyzers/common/v2=/local/path/to/common
Alternatively you can achieve the same result by manually updating the go.mod file:
module gitlab.com/gitlab-org/security-products/analyzers/awesome-analyzer/v2
replace gitlab.com/gitlab-org/security-products/analyzers/common/v2 => /path/to/common
require (
...
gitlab.com/gitlab-org/security-products/analyzers/common/v2 v2.19.0
)
If you want to use docker with replace in the go.mod file follow these steps:
common into the directory of the analyzer. cp -r /path/to/common path/to/analyzer/common.Dockerfile: COPY common /common.replace statement to make sure it matches the destination of the COPY statement in the step above:
replace gitlab.com/gitlab-org/security-products/analyzers/common/v2 => /commonAnalyzer relies on the command Go package to implement
a command line that implements these sub-commands:
search searches for a project that is supported by the analyzer.analyze performs the analysis in a given directory.convert converts the output to a gl-sast-report.json artifact.run performs all the previous steps consecutively.All you need to do is to implement:
command.MatchFunccommand.ConvertFuncanalyze sub-commandVideo walkthrough of how Dependency Scanning analyzers are using multi project pipeline feature to test analyzers using test projects. We create test projects by following the procedure defined in test/commons
Analyzers are independent projects that follow their own versioning. Though to ensure compatibility between analyzers, common API and orchestrators that uses them, they all share the same MAJOR version number. Minor and Patch can be bumped as long as backward compatibility with the common API is kept. Patch version bumps tend to correspond to a Minor version bump of the underlying tools (i.e. bandit), allowing us greater flexibility in reserving Minor bumps for more significant changes to our scanners. In case of breaking changes imposed by the wrapped scanner, creating a new analyzer on a separate repository must be considered.
One important outcome of common API and analyzers sharing the same MAJOR version number is that when a new analyzer project is started, its MAJOR version should be equal to the current one of the common library.
The analyzers are released as Docker images following this scheme:
master branch will override the edge image tagawesome-feature branch will generate a matching awesome-feature image tagMajor.Minor.Patch image tag. A manual job allows to override the corresponding Major and the latest image tags to point to this Major.Minor.Patch.To release a new analyzer Docker image, follow these steps:
Ensure that the CHANGELOG.md entry for the new analyzer is correct.
Ensure that the release source (typical the master or main branch) has a passing pipeline.
Create a new release for the analyzer project by selecting the Deployments menu on the left-hand side of the project window, then selecting the Releases sub-menu.
Click the New release button to open the New Release page.
Tag name drop down, enter the same version used in the CHANGELOG.md, for example v2.4.2 and select the option to create the tag (Create tag v2.4.2 here).Release title enter the same version used above, for example v2.4.2.Release notes field, copy and paste the notes from the corresponding version in the CHANGELOG.md.Create release button.Announce the release on the relevant group slack channel. Example message:
FYI I've just released
ANALYZER_NAMEANALYZER_VERSION.LINK_TO_RELEASE
After following the above process and creating a new release, a new git tag will be created with the Tag name provided above. This will trigger a new pipeline with the given tag version and a new analyzer Docker image will be built.
If the analyzer uses the analyzer.yml template, then the pipeline triggered as part of the New release process above will automatically tag and deploy a new version of the analyzer Docker image.
If the analyzer does not use the analyzer.yml template, you'll need to manually tag and deploy a new version of the analyzer Docker image using these steps:
CI/CD menu on the left-hand side of the project window, then select the Pipelines sub-menu.v2.4.2blocked state.Manual job play button on the right hand side of the window and select tag version to tag and deploy a new version of the analyzer Docker imageOnce a new version of the analyzer Docker image has been tagged and deployed, please test it with the corresponding test project.
Use your best judgment to decide when to create a git tag, which will then trigger the release job. If you can't decide, then ask for other's input. Never delete a git tag that has been pushed as there is a good chance that the tag will be used and/or cached by the Go package registry.
Contributions are welcome, see CONTRIBUTING.md for more details.
This code is distributed under the MIT Expat license, see the LICENSE file.
FAQs
Unknown package
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CTO Ahmad Nassri discusses why supply chain attacks now target developer machines and what AI means for the future of enterprise security.

Security News
Learn the essential steps every developer should take to stay secure on npm and reduce exposure to supply chain attacks.

Security News
Experts push back on new claims about AI-driven ransomware, warning that hype and sponsored research are distorting how the threat is understood.