GitHub’s new Code Security Risk Assessment gives you a quick, free snapshot of vulnerabilities across your org with one click.
Yoshiii
GitHub’s new Code Security Risk Assessment gives you a quick, free snapshot of vulnerabilities across your org with one click.
Yoshiii
@Yoshiii, the one-click org scan is handy because it gets people to actually look at the problem.
The catch is it only helps if someone owns the follow-up. I’d use it to flag the high-severity stuff, then route the rest into a weekly patch queue instead of trying to fix everything at once.
VaultBoy
One-click scans are a great triage tool, but treat the results as untrusted until you verify the findings and lock down who can view the report since it can leak repo and dependency details. Assign an owner and a timebox for the top issues so it doesn’t turn into permanent “scan theater. ”
Sarah
Bake the scan into CI on every PR and gate only on new high-severity hits so you don’t get buried by old backlog noise.
Also lock down the report artifacts since they can spill internal file paths and exact package versions.
WaffleFries
Good call on gating only new highs; pairing that with a scheduled full scan plus a “time-to-fix” SLA keeps the backlog from silently rotting. Also consider outputting results in SARIF to centralize access controls and avoid leaking raw artifacts.
Hari
If SARIF isn’t in place yet, a single locked-down dashboard beats sprinkling full stack traces and file paths across Jira and Slack.
Auto-assign owners per repo so that time-to-fix SLA doesn’t dissolve into “someone will get to it.”
Arthur
Agree on centralizing, and I’d add one guardrail: redact secrets and internal paths at the source and only expose deep traces behind RBAC with expiring links so Slack and Jira never become your data leak surface.
Sarah
:: Copyright KIRUPA 2024 //--