This action runs a Dastardly vulnerability scan against a target site. On completion, a JUnit XML report is generated containing information about the vulnerabilities found, where they were located, additional information about the vulnerability and links to our learning resources with suggestions on how to fix them.
- Dastardly is a free, lightweight web application security scanner for your CI/CD pipeline.
- It is designed specifically for web developers, and checks your application for seven security issues that are likely to interest you during software development.
- Dastardly is based on the same scanner as Burp Suite (Burp Scanner).
For full documentation on using Dastardly, please consult the Dastardly documentation.
Already used Dastardly? Tell us what you think here.
Required The full URL (including scheme) of the site to scan.
Optional The name of the output report file. This will be stored in the GITHUB_WORKSPACE (/github/workspace) directory.
Default dastardly-report.xml
Below are some examples of how to use the action by running a Dastardly scan against our very own Gin and Juice Shop site. This is a deliberately vulnerable web application designed for testing web vulnerability scanners.
steps:
- name: Run Dastardly Action Step
uses: PortSwigger/dastardly-github-action@main
with:
target-url: 'https://ginandjuice.shop'
Dastardly produces a JUnit XML report of the scan on completion. This report will only include vulnerability details if vulnerabilities were found by the scanner.
By default, if Dastardly finds any issue with a severity level of LOW
, MEDIUM
, or HIGH
, it will fail a workflow build.
This may be fine for your use case, but you may want to consider pairing this action with a JUnit XML parser that runs whether or not the Dastardly action step succeeded. You can
do this by adding continue-on-error: true
to the Dastardly action step, or adding a condition for the parser to run regardless of success or failure.
steps:
- name: Run Dastardly Action Step
continue-on-error: true # This allows subsequent steps to run even if this step fails
uses: PortSwigger/dastardly-github-action@main
with:
target-url: 'https://ginandjuice.shop'
# You can replace this next step with any JUnit XML parser of your choosing
- name: Publish Test Report
if: always() # Forces this step to always run
uses: mikepenz/action-junit-report@v3
with:
report_paths: '**/dastardly-report.xml' # You need to update this path if you pass in a different output filename to the Dastardly action
require_tests: true
We suggest passing require_tests: true
to this parser so that your workflow will fail if it could not find your specified output file.
Documentation for the parser used in this example can be found here.