Skip to content

WTFender/wpscan-action

Use this GitHub action with your project
Add this Action to an existing workflow or create a new one
View on Marketplace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

67 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

WPScan docker action

Scan a URL with wpscan, a WordPress vulnerability scanner.

Examples

Run a scan

uses: WTFender/[email protected]
with:
  url: 'https://WORDPRESS_SITE/'

Weekly scan, notify webhook, and echo results

on:
  schedule:
    - cron:  0 10 * * 1 # Monday at 10 UTC
jobs:
  wpscan:
    runs-on: ubuntu-latest
    steps:
      - name: WPScan
        uses: WTFender/[email protected]
        id: wpscan
        with:
          url: 'https://WORDPRESS_SITE/'
          token: ${{ secrets.WPSCAN_TOKEN }}
          webhook: ${{ secrets.SLACK_WEBHOOK }}
      - name: Scan Results
        run: |
          echo ${{ steps.wpscan.outputs.resultb64 }}
          echo ${{ steps.wpscan.outputs.result }}

Inputs

url

Required. Scan target URL.

token

API token for wpscan.com. Required for vulnerability data.

options

WPScan CLI options. Default --disable-tls-checks.

webhook

Slack webhook URL.

webhookevent

Events to send webhook on: Default vulns,aborted. Allowed vulns,aborted,completed.

Outputs

result

JSON scan results.

resultb64

JSON scan results, base64 encoded.

Webhook

.