New generation cyber attacks are expoloited via legal HTTP requests! Just changing a parameter value can't be avoid by the application. It's totally legal and valid HTTP request to be executed from the frontend and the backend server.
Optimized scanning features, you will be able to manage your scheduled API endpoint scans, import your documentation files, and perform scanning against specific vulnerabilities.
Input | Description |
---|---|
token | provided Access Token from platform |
api_url | provided API url from platform -optional |
scan_id | scan policy ID |
tag_name | tag -optional |
fail_action | action status will be set to fail if Cyprox any alerts during the scan -optional |
on: [push]
jobs:
api_scan:
runs-on: ubuntu-latest
name: Cyprox API Scan Action
steps:
- name: Cyprox
uses: cyproxio/[email protected]
with:
token: ${{ secrets.CYPROX_ACCESS_TOKEN }}
scan_id: '6408f0b564e2a543a7d7cef2'
tag_name: ${{ github.sha }}
fail_action: true