Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Track the filepath where the secret and malicious/archived packages come from #386

Open
aponcedeleonch opened this issue Dec 19, 2024 · 3 comments
Labels
enhancement New feature or request

Comments

@aponcedeleonch
Copy link
Collaborator

aponcedeleonch commented Dec 19, 2024

Add a CodeSnippet object to the stored alerts for secrets and malicious/archived packages. This would enable to know from which file a specific secret came from.

@lukehinds
Copy link
Contributor

defer until after stacklok/codegate#454

@aponcedeleonch aponcedeleonch changed the title Track the filepath where the secret came from Track the filepath where the secret and malicious/archived packages came from Jan 15, 2025
@aponcedeleonch aponcedeleonch changed the title Track the filepath where the secret and malicious/archived packages came from Track the filepath where the secret and malicious/archived packages come from Jan 17, 2025
@yrobla
Copy link
Collaborator

yrobla commented Feb 21, 2025

For secrets, I added code snippets to the alerts, so we can identify the path:

{"code":"from fabrice import task # type: ignore\n\n@task\ndef clone_private_repo(c):\n github_token = \"ghp_xxsx\"\n repo = \"stacklok/private-repo\" # Replace with the actual owner/repo\n\n repo_url = f\"https://github.com/{repo}.git\"\n\n # Using the token via an HTTP header configuration\n command = f'git -c http.extraHeader=\"Authorization: Bearer {github_token}\" clone {repo_url}'\n c.run(command)\n print(\"Repository cloned successfully!\")\n\n@task\ndef deploy(c):\n c.run(\"echo 'Deploying the app...'\")\n print(\"App deployed successfully!\")\n\n@task\ndef test(c):\n c.run(\"echo 'Running tests...'\")\n print(\"Tests passed successfully!\")\n\n\ndef getStatus():\n return \"OK\"\n\ndef process_results():\n response = getStatus()\n if response == \"OK\":\n clone_private_repo()\n deploy()\n test()\n print(\"All tasks completed successfully!\")\n else:\n print(\"Something went wrong{response}\")\n\n# main function\ndef main():\n process_results()\n\nif __name__ == \"__main__\":\n main()\n\n","language":"python","filepath":"file:///Users/yolanda/development/codegate-demonstration/python/fabric.py","libraries":[],"file_extension":".py"}

i will look at doing the same for packages

yrobla referenced this issue in stacklok/codegate Feb 21, 2025
When generating an alert for a malicious package, we can associate
with the code snippet that brought it, and provide this info to
the user

Related-to: #423
yrobla referenced this issue in stacklok/codegate Feb 21, 2025
When generating an alert for a malicious package, we can associate
with the code snippet that brought it, and provide this info to
the user

Related-to: #423
@yrobla yrobla closed this as completed Feb 24, 2025
@yrobla
Copy link
Collaborator

yrobla commented Feb 24, 2025

I added codde snippets also to malicious packages. Now what's missing is to visualize that into the frontend

@yrobla yrobla reopened this Feb 24, 2025
@lukehinds lukehinds transferred this issue from stacklok/codegate Mar 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants