Hello,
I'm trying to incorporate a Zap scan of our site into a Github workflow. Here is my current code...
name: OWASP ZAP Scan
on:
push:
branches:
- MYOPS/zap-dev
jobs:
zap-scan:
runs-on: ubuntu-latest
steps:
# Checkout the code (if necessary, for example, to get app URL for testing)
# I don't think I need this, but left in just in case.
- name: Checkout code
uses: actions/checkout@v3
# Set up Docker (ZAP will run in a container)
- name: Set up Docker
uses: docker/setup-buildx-action@v2
# Run OWASP ZAP Scan
- name: Run ZAP Scan
uses: zaproxy/action-f...@v0.12.0
with:
token: ${{ secrets.GITHUB_TOKEN }}
#docker_name: '
ghcr.io/zaproxy/zaproxy:stable' # or :nightly?
docker_name: '
zaproxy/zap-stable'
target: '${{ env.ZAP_URL }}'
rules_file_name: '.zap/rules.tsv'
cmd_options: '-a'
artifact_name: 'myserver_zap_scan'
env:
ZAP_URL: "
https://somesite-private.somesite.com"
And here are my questions. For the docker_name, which do I use from the above (that commented or the current active parameter)?
No matter which I use, I see this in the build output...
Error when reading the rules file: /home/runner/work/MyRepo/MyRepo/.zap/rules.tsv
Also, the scan seems really quick as compared to running the scan via the Zap .exe. How can I be sure the Ajax spider is running?
Any help with folding this into our build process is greatly appreciated!