Skip to main content
Version: 1.4

Scan Sources

Viewing all connected scan sources is available in the Integrations → Scan Sources section. There is also the ability to sort by name, source type, description, and proceed to add, edit, or delete scan sources. Scan Sources

Supported Scan Sources

Git Repository

For a source in Git repository format, the following VCS (Version Control System) types are available:

  • GitHub
  • GitLab
  • BitBucket (cloud and server)
  • Other (other types can be connected)
info

When running scans using a BitBucket source, the specified port may be adjusted. For example, ssh://git@bitbucket.int.tronasoc.ru:0000/test/command.git may be formatted as https://bitbucket.int.tronasoc.ru:0000/test/command.git

caution

After updating TRON.ASOC to a version higher than 1.2.1, it is required to reconfigure previously added integrations with Git Repository sources where the VCS type was not configured.

Other sources:

  • Nexus
  • CLI Tool
  • Jfrog
  • Harbor
  • AppUrl

Connecting a Scan Source

To connect a scan source, follow these steps:

  1. Navigate to the Integrations → Scan Sources section.

  2. Click the Add Scan Source button.

  3. In the opened scan source addition form, fill in the fields:

    • Name

    • Description

    • In the dropdown menu of the Source field, select the scan source

      Scan Sources

  4. After selecting the source tool, fill in additional fields:

    • Source URL
    • Authentication Method - Filling this field at this stage is not mandatory, but without it, you cannot test the connection to the scan source.
    • Skip test connection - when selecting this parameter, the connection with the source will not be checked before starting the scan (applied in case there is no network access to the sources)
  5. Further fields to fill may differ depending on the chosen authentication method:

    • If the method is specified and API token authentication is selected, fill in the API Token field
    • If login and password authentication is selected, fill in the Login/Password fields

    For the Git Repository source, several authentication types are available:

    • API Token
    • Login/Password
    • Anonymous
    • SSH (secure authorization method via SSH key, all SSH types are available except passphrase)

    Scan Sources

  6. To test the connection, click the Test Connection button. The system will send a connection request to the source, and a corresponding notification will be displayed in the upper right corner of the user interface.

  7. Then click the Create button.

Editing a Scan Source

Editing a source is done using the Scan Sources button in the corresponding scan source. The editing form is similar to the addition form, but the fields are filled with current data. Scan Sources

Deleting a Scan Source

To delete a scan source:

  1. Go to the Integrations → Scan Sources section

  2. Click the Scan Sources button in the row of the scan source you want to delete

  3. In the opened window, confirm the deletion of the source

    Scan Sources

Combinations of scan sources and security tools in checks

The TRON.ASOC solution implements the following combinations of sources and security tools:

  • CLI tools (ESLint, Gitlab SAST, Trivy, Grype, KICS, Aqua, OWASP Dependency Track) + CLI Custom source These security tools can form checks only with CLI Custom source.

  • CLI tools with the ability to run in k8s (PVS Studio, Semgrep) (within the unstable release 1.3.1) + Git Repository These tools support running. The tool runs in k8s as a job, receives data from the source, performs a security check, and returns a report with security issues.

  • KCS/Appscreener Solar DAST + Nexus/Harbor/Jfrog When creating such a check, it is additionally necessary to fill in the Source branch/tag (multiple allowed). Checks can be run, but reports can also be imported.

  • Appscreener Solar SAST/ Solar SCA/ PTAI + Git Repository When creating such a check, it is additionally necessary to fill in the Source branch/tag (multiple allowed). Checks can be run, but reports can also be imported.

  • SASTAV + Git Repository When creating such a check, it is additionally necessary to fill in the Scanning ruleset, as well as the connection between the Source branch/tag and the commit. Checks can be run, but reports can also be imported.

  • CodeScoring + Git Repository/Nexus/Harbor/Jfrog When creating such a check, it is additionally necessary to fill in the security check type - SCA, container SCA, secrets. In the latter case, it is suggested to select a secrets configuration or upload a new one. Then fill in the Source branch/tag (multiple allowed). Checks can be run, but reports can also be imported.

  • Manual tool + CLI Custom source This type of security tool can form checks only with CLI Custom source, because these tools are supported only for uploading SARIF and JSON reports.