Skip to content

Conversation

lukeina2z
Copy link

This commit implements complete security scanning for aws-xray-sdk-go:

CodeQL Security Analysis (.github/workflows/codeql-analysis.yml)

  • CodeQL analysis for Go code security scanning with security-extended queries
  • govulncheck for official Go vulnerability database scanning
  • gosec for Go-specific security analysis and vulnerability detection
  • Nancy for Go module dependency vulnerability scanning
  • Trivy for comprehensive filesystem and Go module scanning
  • Runs on PR/push and weekly schedule
  • Go 1.24 support matching project requirements

Daily Security Scan (.github/workflows/daily-scan.yml)

  • Comprehensive Go module dependency scanning twice daily
  • Published Go module version analysis from Go module proxy
  • Multi-tool approach: govulncheck, gosec, Nancy, Trivy
  • Tracks Go module versions and dependency graphs
  • Generates detailed summary reports with vulnerability counts
  • Monitors both current development and published module versions

Key Features

  • Comprehensive coverage: source code, Go modules, published packages
  • Go-focused: govulncheck, gosec, Nancy, Trivy
  • Module-aware: Go module proxy integration, dependency graph analysis
  • Security-focused: commit hashes, proper permissions, categorized results
  • Production-ready: scans actual published Go modules from proxy
  • Robust: proper timeouts, error handling, and comprehensive reporting
  • Multi-tool approach: combines 4 different Go security scanners
  • Actionable: clear reporting and GitHub Security tab integration

Addresses the critical security gap where aws-xray-sdk-go had no automated security scanning despite being critical infrastructure used in production.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

@lukeina2z lukeina2z requested a review from a team as a code owner September 24, 2025 01:23
@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

@lukeina2z lukeina2z force-pushed the security-scan-pr branch 7 times, most recently from 8d01916 to d2d8ee1 Compare September 24, 2025 01:43
This commit implements complete security scanning for aws-xray-sdk-go:

## CodeQL Security Analysis (.github/workflows/codeql-analysis.yml)
- CodeQL analysis for Go code security scanning with security-extended queries
- govulncheck for official Go vulnerability database scanning
- gosec for Go-specific security analysis and vulnerability detection
- Nancy for Go module dependency vulnerability scanning
- Trivy for comprehensive filesystem and Go module scanning
- Uses commit hashes instead of version tags for supply chain security
- Runs on PR/push and weekly schedule
- Go 1.24 support matching project requirements

## Daily Security Scan (.github/workflows/daily-scan.yml)
- Comprehensive Go module dependency scanning twice daily
- Published Go module version analysis from Go module proxy
- Multi-tool approach: govulncheck, gosec, Nancy, Trivy
- Tracks Go module versions and dependency graphs
- Generates detailed summary reports with vulnerability counts
- Monitors both current development and published module versions

## Key Features
- Comprehensive coverage: source code, Go modules, published packages
- Go-focused: govulncheck, gosec, Nancy, Trivy
- Module-aware: Go module proxy integration, dependency graph analysis
- Security-focused: commit hashes, proper permissions, categorized results
- Production-ready: scans actual published Go modules from proxy
- Robust: proper timeouts, error handling, and comprehensive reporting
- Multi-tool approach: combines 4 different Go security scanners
- Actionable: clear reporting and GitHub Security tab integration

Already detected vulnerabilities including GO-2025-3751 (sensitive headers issue).

Addresses the critical security gap where aws-xray-sdk-go had no automated
security scanning despite being critical infrastructure used in production.
@lukeina2z lukeina2z changed the title [WIP] Add comprehensive security scanning workflows for Go SDK Add comprehensive security scanning workflows for Go SDK Sep 24, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant