Kali Linux

Scanmycode-Ce : Code Scanning/SAST/Static Analysis/Linting Using Many tools/Scanners

Scanmycode-Ce is a Code Scanning/SAST/Static Analysis/Linting solution using many tools/Scanners with One Report. You can also add any tool to it. Currently, it supports many languages and tech stacks. Similar to SonarQube, but it is different.

Fig. 1 Scanmycode concept diagram

TLDR

To install it. Install docker and docker-compose and then:

2 options

  • Fastest (use DockerHub built images). If unsure, use this.

git clone https://github.com/marcinguy/scanmycode-ce.git
cd scanmycode-ce/dockerhub
./start.sh

  • Slower (build everything)

git clone https://github.com/marcinguy/scanmycode-ce.git
cd scanmycode-ce/docker
./start.sh

Go in the Browser to:

http://localhost:5000

Sign up locally (and login in when needed)

Under the hood

Progpilot, PMD, Bandit, Brakeman, Gosec, confused, semgrep, trufflehog3, jshint, log4shell via custom semgrep rule and other(s). Some were modified.

Recorded DEMO

Community Edition does not have GitHub support and other plugins. But rest is the same.

How is Scanmycode different than SonarQube?

Both use static analysis to find bugs and defects, but there are a few differences.

  • Scanmycode can be extended with any tool producing JSON output (any binary, in any technology/language/product). That’s the biggest difference.
  • Scanmycode is Open Source, SonarQube also offers an open-source version, but it is missing features (For example, 12 of the supported languages are not available in the open-source offering, and more powerful dataflow features are only available in the paid versions)
  • Scanmycode supports scanning only changed files (differential analysis), SonarQube does not
  • Scanmycode uses also semgrep as one of the tools (without semgrep community rules, only Scanmycode’s custom rules)

Below are semgrep’s (also Scanmycode advantages over SonarQube):

“Extending Semgrep with custom rules is simple, since Semgrep rules look like the source code you’re writing. Writing custom rules with SonarQube is restricted to a handful of languages and requires familiarity with Java and abstract syntax trees (ASTs).”

“Semgrep focuses on speed and ease-of-use, making analysis possible at up to 20K-100K loc/sec per rule. SonarQube authors report approximately 0.4K loc/sec for rulesets in production.”

Source: semgrep’s website

Welcome to Scanmycode CE (Community Edition)!

Scanmycode is based on QuantifedCode. QuantifiedCode is a code analysis & automation platform. It helps you to keep track of issues and metrics in your software projects, and can be easily extended to support new types of analyses. The application consists of several parts:

  • A frontend, realized as a React.js app
  • A backend, realized as a Flask app, that exposes a REST API consumed by the frontend
  • A background worker, realized using Celery, that performs the code analysis

Currently supports: PHP, Java, Scala, Python, Ruby, Javascript, GO, Secret Scanning, Dependency Confusion, Trojan Source, Open Source and Proprietary Checks (total ca. 1000 checks)

Advantages:

  • Many tools, one report (unification)
  • Dismiss, collaborate on findings. Mark false-positives
  • Enable/disable each individual check in Checkers
  • ca. 1000 checks now (Linters, Static Code Analysis/Code Scanning)
  • any tool outputting JSON can be added
  • fast (checks only new code on recheck)
  • Git support (HTTPS/TLS and SSH). For private repositories only SSH.
  • all REST API callable (CI/CD integrateable)
  • Swiss army knife tool/SIEM for Code Scanning
  • 100% Code transparency & full control of your code

Installation

We provide several options for installing Scanmycode. Which one is the right one for you depends on your use case.

  • The manual installation is best if you want to modify or change Scanmycode
  • The Docker-based installation is probably the easiest way to try Scanmycode without much work
  • The Ansible-based installation is the most suitable way if you want to run Scanmycode in a professional infrastructure (possibly with multiple servers)

The following section will only discuss the manual installation process, for the other options please check their corresponding repositories.

Manual Installation

The installation consists of three parts:

  • Install the dependencies required to run Scanmycode
  • Download the required source code
  • Set up the configuration

Installing Dependencies

Scanmycode requires the following external dependencies:

  • A message broker (required for the background tasks message queue). We recommend either RabbitMQ or Redis.
  • A database (required for the core application). We recommend PostgreSQL, but SQLite is supported as well. Other database systems might work too (e.g. MySQL), but are currently not officially supported. If you need to run Scanmycode on a non-supported database, please get in touch with us and we’ll be happy to provide you some guidance.

Download the Scanmycode CE source code

Now with the dependencies installed, we can go ahead and download Scanmycode:

    git clone https://github.com/marcinguy/scanmycode-ce.git

Install the required Python packages

Scanmycode CE manages dependencies via the Python package manager, pip.

Edit Settings

Scanmycode gets configured via YAML settings files. When starting up the application, it incrementally loads settings from several files, recursively updating the settings object. First, it will load default settings from quantifiedcode/settings/default.yml. Then, it will check if a QC_SETTINGS environment variable is defined and points to a valid file, and if so it will load settings from it (possibly overwriting default settings). If not, it will look for a settings.yml file in the current working directory and load settings from there. Additionally, it will check if a QC_SECRETS environment variable is defined and points to a valid file, and also load settings from there (this is useful for sensitive settings that should be kept separate from the rest [e.g. to not check them into version control]).

There is a sample settings.yml file in the root of the repository that you can start from.

Running the Setup

After editing your settings, run the setup command via

    #run from the root directory of the repository
    python manage.py setup

The setup assistant will iteratively walk you through the setup, and when finished you should have a working instance of Scanmycode!

Running the web application

To run the web application, simply run

    python manage.py runserver

Running the background worker

To run the background worker, simply run

    python manage.py runworker

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago