Skip to content

Commit 4bcb677

Browse files
linad87gitbook-bot
authored andcommitted
GITBOOK-126: change request with no subject merged in GitBook
1 parent a2b2fbb commit 4bcb677

File tree

4 files changed

+40
-43
lines changed

4 files changed

+40
-43
lines changed

jfrog-applications/SUMMARY.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,8 @@
7676
* [Scan Azure Repos Pull Request](jfrog-applications/frogbot/scan-pull-requests/scan-azure-repos-pull-request.md)
7777
* [Scan Bitbucket Server Pull Request](jfrog-applications/frogbot/scan-pull-requests/scan-bitbucket-server-pull-request.md)
7878
* [Pull Request Scan Results](jfrog-applications/frogbot/scan-pull-requests/pull-request-scan-results.md)
79-
* [Scan Repositories](frogbot/scan-repositories.md)
79+
* [Scan Git Repositories](jfrog-applications/frogbot/scan-repositories/README.md)
80+
* [View Security Alerts on Github](jfrog-applications/frogbot/scan-repositories/view-security-alerts-on-github.md)
8081
* [Frogbot Badge](frogbot/frogbot-badge.md)
8182

8283
## CI & SDKs

jfrog-applications/frogbot/scan-repositories.md

Lines changed: 0 additions & 42 deletions
This file was deleted.
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
# Scan Git Repositories
2+
3+
Frogbot scans your Git repositories periodically and automatically creates pull requests for upgrading vulnerable dependencies to a version with a fix.
4+
5+
![](../../../.gitbook/assets/fix-pr.png)
6+
7+
_**NOTE:**_ The pull request fix is presently unavailable for older NuGet projects that use the package.config file instead of the PackageReference syntax.
8+
9+
####
Lines changed: 29 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
# View Security Alerts on Github
2+
3+
For GitHub repositories, issues that are found during Frogbot's periodic scans are also added to the [Security Alerts](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/managing-code-scanning-alerts-for-your-repository) view in the UI.
4+
5+
![](../../../.gitbook/assets/github-code-scanning.png)
6+
7+
The following alert types are supported:
8+
9+
**1. CVEs on vulnerable dependencies**
10+
11+
![](../../../.gitbook/assets/github-code-scanning-content.png)
12+
13+
**2. Secrets that are exposed in the code**
14+
15+
![](../../../.gitbook/assets/github-code-scanning-secrets-content.png)
16+
17+
**3. Infrastructure as Code (Iac) issues on Terraform packages**
18+
19+
![](../../../.gitbook/assets/github-code-scanning-iac-content.png)
20+
21+
**4. Static Application Security Testing (Sast) vulnerabilities**
22+
23+
![](../../../.gitbook/assets/github-code-scanning-sast-content.png)
24+
25+
**5. Validate Allowed Licenses**
26+
27+
When Frogbot scans the repository periodically, it checks the licenses of any project dependencies. If Frogbot identifies licenses that are not listed in a predefined set of approved licenses, it adds an alert. The list of allowed licenses is set up as a variable within the Frogbot workflow.
28+
29+
![](../../../.gitbook/assets/github-code-scanning-license-violation-content.png)

0 commit comments

Comments
 (0)