As a(n)
Repository Administrator
I want
automated vulnerability and secret scanning via GitHub-native tools integrated into our regression workflow
So that
we can detect and remediate high-risk security issues early in the CI/CD pipeline, while offloading remediation issue generation to QA
Executive Summary
We need to implement lightweight and maintainable security scanning using GitHub's built-in capabilities. This includes CVE scanning for Python code and Docker images, as well as secret detection. These scans will run as part of the regression or PR workflows. QA will own triage and remediation tracking. The approach must remain simple, free, and integrated into GitHub Actions.
Acceptance Criteria
In-Scope
- Python backend repositories
- Docker images built in CI
- GitHub Container Registry
- Regression / PR GitHub Actions workflows
Out-of-Scope
- Third-party commercial security tools (Snyk, Checkmarx, etc.)
- Non-GitHub-native dependency management tooling
Suggested Tools Comparison
| Tool |
Focus |
Strengths |
Weaknesses |
Pricing |
| CodeQL |
CVE scanning (GitHub native) |
Deep analysis, integrates with GitHub UI |
Custom queries require learning |
Free (GitHub) |
| Semgrep |
Multi-language SAST |
Customizable, strong community rulesets |
Needs tuning |
Free (OSS) |
| Bandit |
Python AST scanning |
Easy GitHub integration, lightweight |
Basic detection only |
Free (OSS) |
| Safety |
Python dependency scanning |
Scans for known CVEs from PyUp DB |
Limited to packages |
Free (basic) |
| detect-secrets |
Secrets in code |
Pre-commit hook, strong local enforcement |
Misses runtime secrets |
Free (OSS) |
| GitHub Secret Scanning |
Secrets pushed to GitHub |
Auto-detects common credentials |
No coverage for custom secrets |
Free |
Implementation Steps
- Analyze available GitHub tools, Bandit, Semgrep, etc.
- Enable GitHub secret scanning for all repos
- Add detect-secrets as an optional pre-commit hook
- Update regression workflow to:
- Fail on high/critical severity findings
- Warn on low/medium
- Run on PRs and scheduled workflows
- Deliver findings to QA team and document remediation process --> automate this via issue generation
As a(n)
Repository Administrator
I want
automated vulnerability and secret scanning via GitHub-native tools integrated into our regression workflow
So that
we can detect and remediate high-risk security issues early in the CI/CD pipeline, while offloading remediation issue generation to QA
Executive Summary
We need to implement lightweight and maintainable security scanning using GitHub's built-in capabilities. This includes CVE scanning for Python code and Docker images, as well as secret detection. These scans will run as part of the regression or PR workflows. QA will own triage and remediation tracking. The approach must remain simple, free, and integrated into GitHub Actions.
Acceptance Criteria
In-Scope
Out-of-Scope
Suggested Tools Comparison
Implementation Steps