Skip to content
/ vrd Public

GitHub action to detect vulnerable regex in a commit.

License

Notifications You must be signed in to change notification settings

meekdenzo/vrd

Use this GitHub action with your project
Add this Action to an existing workflow or create a new one
View on Marketplace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 

Repository files navigation

vrd

A GitHub action to detect vulnerable regex in a pull request.

Usage

Add the following to your workflow configuration:

...
      - name: Checkout repository
        uses: actions/checkout@v2
        with: 
          fetch-depth: '0'
          
      - name: Scan for redos
        uses: meekdenzo/vrd@v1.0.3
...

Note that fetch-depth: '0'

Example

Your full basic workflow should look something like this:

name: vuln-regex-detector
on: [workflow_dispatch]
jobs:
  build:
    name: Scan for redos
    runs-on: ubuntu-latest
    steps:
      - name: Checkout repository
        uses: actions/checkout@v2
        with: 
          fetch-depth: '0'
 
      - name: Scan for redos
        uses: meekdenzo/vrd@v1.0.3

About

GitHub action to detect vulnerable regex in a commit.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages