If you haven't already done so, you will need to follow the Setup Instructions before continuing.
We will use Hawkeye to automatically scan the code base for secrets and vulnerabilities. This is a useful tool to have in your pipeline, in order to prevent anyone in your team from accidentally committing secrets or vulnerabilities.
You can use the Hawkeye docker image to scan the sample project repository (see Setup Instructions) with:
docker run --rm -v "$PWD/web:/target" hawkeyesec/scanner-cli:latest
If you're running this against your own repository, make sure you choose the right directory for Hawkeye to scan (hint: you probably want to remove /web
).
Did you find anything interesting? If you were responsible for this repository, which of the findings do you think would be the most concerning / highest priority to fix?
Note: If you run Hawkeye on the root of the repo with the java-find-secbugs
enabled, and you
have Talisman installed globally, then there may be a symlink in .git/hooks/pre-commit
that will
trip up Hawkeye with the following error:
[error] Unexpected error occurred! ENOENT: no such file or directory, stat '/target/.git/hooks/pre-commit'
If you get the error shown above, add the java-find-secbugs
module to .hawkeyerc
to resolve the error.