-
Notifications
You must be signed in to change notification settings - Fork 1.1k
[TT-15942]: Integrate Sentinel One CNS scanner workflow. #7423
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Signed-off-by: Asutosh <asutosh@tyk.io>
🔍 Code Analysis ResultsChange Impact Analysis1. What this PR accomplishesThis pull request integrates the SentinelOne Cloud Native Security (CNS) scanner into the project's CI/CD pipeline. It introduces a new GitHub Actions workflow that automatically scans the codebase for secrets, Infrastructure as Code (IaC) misconfigurations, and vulnerabilities on every pull request targeting the 2. Key technical changes introduced
3. Affected system components
Architecture VisualizationThe following sequence diagram illustrates the process flow of the new SentinelOne CNS Scan workflow, from the initial pull request event to the final pass/fail status report. sequenceDiagram
participant Dev as Developer
participant GitHub
participant S1_Workflow as "SentinelOne Scan Workflow"
participant S1_CLI as "s1-cns-cli"
participant S1_Console as "SentinelOne Console"
Dev->>GitHub: Opens/Updates Pull Request to master
GitHub->>S1_Workflow: Triggers workflow on PR event
activate S1_Workflow
S1_Workflow->>S1_Workflow: 1. Checkout code (full history)
S1_Workflow->>S1_CLI: 2. Configure CLI with S1 secrets
S1_Workflow->>S1_CLI: 3. Run Secret Scan on PR diff
activate S1_CLI
S1_CLI-->>S1_Console: Publish Secret Scan Results
S1_CLI-->>S1_Workflow: Scan complete
deactivate S1_CLI
S1_Workflow->>S1_CLI: 4. Run IaC Scan on repo
activate S1_CLI
S1_CLI-->>S1_Console: Publish IaC Scan Results
S1_CLI-->>S1_Workflow: Scan complete
deactivate S1_CLI
S1_Workflow->>S1_CLI: 5. Run Vulnerability Scan on repo
activate S1_CLI
S1_CLI-->>S1_Workflow: Scan complete
deactivate S1_CLI
S1_Workflow->>S1_Workflow: 6. Aggregate and check scan outcomes
alt Any scan failed
S1_Workflow->>GitHub: Report Failure (Workflow fails)
else All scans passed
S1_Workflow->>GitHub: Report Success (Workflow succeeds)
end
deactivate S1_Workflow
Powered by Visor from Probelabs Last updated: 2025-10-08T10:26:14.787Z | Triggered by: synchronize | Commit: fe143e2 |
🔍 Code Analysis ResultsSecurity Issues (1)
Performance Issues (1)
Quality Issues (1)
Style Issues (1)
✅ Dependency Check PassedNo dependency issues found – changes LGTM. ✅ Connectivity Check PassedNo connectivity issues found – changes LGTM. Powered by Visor from Probelabs Last updated: 2025-10-08T10:26:15.764Z | Triggered by: synchronize | Commit: fe143e2 |
Signed-off-by: Asutosh <asutosh@tyk.io>
Description
This adds a github action workflow that will scan the code base for vulnerabilities, secrets, misconfigurations etc. on every pull request.
These can be manged based on centrally set up rules on the S1 console.
Related Issue
TT-15942
Motivation and Context
This is to integrate S1 with our repositories so that everything can be managed centrally in the S1 console.
How This Has Been Tested
This is not very testable, as it requires the workflow to be added and then run to actually see how it behaves.
But some scans have been done independently locally for testing.
Screenshots (if appropriate)
NA
Types of changes
Checklist