Skip to content

BST-13272 Feat/poutine #212

New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Draft
wants to merge 9 commits into
base: main
Choose a base branch
from
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 21 additions & 0 deletions scanners/boostsecurityio/poutine/module.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
api_version: 1.0

id: boostsecurityio/poutine
name: BoostSecurity Poutine
namespace: boostsecurityio/Poutine
scan_types:
- sast

config:
support_diff_scan: true
require_full_repo: true

steps:
- scan:
command:
docker:
image: public.ecr.aws/boostsecurityio/boost-scanner-poutine:0d9767e@sha256:1f3ca616dcdde9e984d758dd1e78e73f834e6e1e12d07c4364a3d7d9b64918f9
command: |
-c "poutine analyze_local . --format sarif"
workdir: /src
format: sarif
30 changes: 30 additions & 0 deletions scanners/boostsecurityio/poutine/rules.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
rules:
injection:
categories:
- ALL
- boost-baseline
- boost-hardened
- supply-chain
- supply-chain-cicd-vulnerable-pipeline
- supply-chain-cicd-severe-issues
description: The pipeline contains an injection into bash or JavaScript with an expression that can contain user input. Prefer placing the expression in an environment variable instead of interpolating it directly into a script.
name: injection
group: supply-chain-cicd-vulnerable-pipeline
pretty_name: Serialized AI model with malicious behavior
ref: https://boostsecurityio.github.io/poutine/rules/injection/
recommended: true
untrusted_checkout_exec:
categories:
- ALL
- boost-baseline
- boost-hardened
- supply-chain
- supply-chain-cicd-vulnerable-pipeline
- supply-chain-cicd-severe-issues
description: The workflow appears to checkout untrusted code from a fork and uses a command that is known to allow code execution.
name: untrusted_checkout_exec
group: supply-chain-cicd-vulnerable-pipeline
pretty_name: Arbitrary Code Execution from Untrusted Code Changes
ref: https://boostsecurityio.github.io/poutine/rules/untrusted_checkout_exec/
recommended: true