Skip to content

Feature/lab9#9

Open
ellilin wants to merge 11 commits into
mainfrom
feature/lab9
Open

Feature/lab9#9
ellilin wants to merge 11 commits into
mainfrom
feature/lab9

Conversation

@ellilin
Copy link
Copy Markdown
Owner

@ellilin ellilin commented Apr 6, 2026

Goal

Complete Lab 9 by demonstrating runtime security monitoring with Falco and offline policy-as-code validation with Conftest, then document the findings in the required submission file.

Changes

  • Added Falco runtime detection artifacts, including a custom rule in labs/lab9/falco/rules/custom-rules.yaml
  • Captured Falco alert evidence in labs/lab9/falco/logs/falco.log and labs/lab9/falco/logs/falco-alerts.txt
  • Ran Conftest against the provided Kubernetes and Docker Compose manifests and saved the outputs under labs/lab9/analysis/
  • Added labs/submission9.md with Falco evidence, Conftest results, manifest/policy analysis, and environment notes for Docker Desktop on macOS

Testing

  • Started Falco in Docker Desktop-compatible mode and verified runtime alerts from:
    • interactive shell execution in lab9-helper
    • writes to /usr/local/bin/
    • falcosecurity/event-generator:latest run syscall
  • Ran Conftest against:
    • labs/lab9/manifests/k8s/juice-unhardened.yaml
    • labs/lab9/manifests/k8s/juice-hardened.yaml
    • labs/lab9/manifests/compose/juice-compose.yml
  • Confirmed expected results:
    • unhardened manifest failed with policy violations
    • hardened manifest passed
    • compose manifest passed
  • Pre-commit secret scanning passed with TruffleHog and Gitleaks before commit

Artifacts & Screenshots

  • Submission report: labs/submission9.md
  • Falco logs:
    • labs/lab9/falco/logs/falco.log
    • labs/lab9/falco/logs/falco-alerts.txt
  • Custom rule:
    • labs/lab9/falco/rules/custom-rules.yaml
  • Conftest outputs:
    • labs/lab9/analysis/conftest-unhardened.txt
    • labs/lab9/analysis/conftest-hardened.txt
    • labs/lab9/analysis/conftest-compose.txt

Checklist

  • Clear title following conventional commits (e.g., feat:, fix:, docs:)
  • Documentation updated if needed
  • No secrets or large temporary files included

ellilin and others added 11 commits February 9, 2026 15:59
Complete triage report for OWASP Juice Shop deployment including:
- Scope & Asset information (v19.0.0)
- Environment details (macOS, Docker 28.3.3)
- Deployment verification with health checks
- Surface snapshot analysis
- Top 3 security risks identified
- PR template setup documentation
- GitHub community engagement section
- Generate SBOMs with Syft and Trivy for OWASP Juice Shop v19.0.0
- Perform SCA with Grype and Trivy vulnerability scanning
- Compare toolchain capabilities: accuracy, coverage, features
- Analyze 1139 packages, 146 vulnerabilities, 32 license types
- Document critical vulnerabilities and remediation strategies

Co-Authored-By: Claude (glm-5) <noreply@anthropic.com>
- SAST analysis with Semgrep (25 code-level findings)
- DAST analysis with ZAP, Nuclei, Nuclei, SQLmap
- Authenticated vs unauthenticated scan comparison
- Tool comparison matrix and recommendations
- SAST/DAST correlation analysis
…lysis

- Scanned Terraform with tfsec, Checkov, and Terrascan (45, 78, 22 findings)
- Scanned Pulumi with KICS (6 findings: 1 CRITICAL, 2 HIGH, 1 MEDIUM)
- Scanned Ansible with KICS (10 findings: 9 HIGH, 1 LOW)
- Created comprehensive tool comparison matrix
- Identified 161 total security vulnerabilities across all frameworks
- Documented top 5 critical findings with remediation code examples
- Provided CI/CD integration strategy with quality gates
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant