This action uses the docker image built every night in https://github.com/dependency-check/DependencyCheck_Builder. This image includes the updated vulnerabilities database so there is no need to update it. Therefore, it speeds up the test.
This action is based upon the OWASP Dependency-Check tool, a Software Composition Analysis (SCA) tool that attempts to detect publicly disclosed vulnerabilities contained within a project’s dependencies. It does this by determining if there is a Common Platform Enumeration (CPE) identifier for a given dependency. If found, it will generate a report linking to the associated CVE entries.
The action receives three parameters: Project name, scanpath and report format, but more parameters can be added as optional.
Example:
on: [push]
jobs:
depchecktest:
runs-on: ubuntu-latest
name: depecheck_test
steps:
- name: Checkout
uses: actions/checkout@v2
- name: Build project with Maven
run: mvn clean install
- name: Depcheck
uses: dependency-check/Dependency-Check_Action@main
id: Depcheck
with:
project: 'test'
path: '.'
format: 'HTML'
- name: Upload Test results
uses: actions/upload-artifact@master
with:
name: Depcheck report
path: ${{github.workspace}}/reports
We recommend adding the above example into your .github/workflows directory, using a name of your choice, in this example main.yml.
It should look like this
Once that action kicks off, you should be able to see it running in the actions tab.
Finally, once it has completed, a report will be generated and accessible from the actions tab
Downloading this and opening it in a browser will give you the following (for example)
Dependency check action was developed by the Santander UK Security Engineering team, namely: