Jenkins uses the Stapler web framework, instead of a more common framework. As a result, generic static analysis tools are often unable to find common vulnerabilities in Jenkins core and plugins.
The Jenkins security team created a custom code scanner based on GitHub’s CodeQL. It is capable of finding vulnerabilities common in Jenkins plugins.
This page explains how to set up code scanning with this tool.
We also publish the Jenkins-specific code scanning rules as a CodeQL pack for use in a standard CodeQL workflow. Refer to the documentation for usage instructions. |
In your GitHub repository, select the "Actions" link on top. If you already have some workflows in your repository, click "New Workflow". In the section "By Jenkins", select "Jenkins Security Scan".
Configure the YAML workflow file in your repository. You can use it without changes. We recommend committing to the default branch instead of adding this file via a pull request. This way, the code scanning findings will not be visible in a pull request check. Once saved, you should be able to see findings for branches in the "Security" tab under "Code scanning alerts". Pull requests will have a new check that shows findings added in it.
You can use the same GitHub workflow in your Jenkins plugin project as long as it’s hosted on GitHub.
Copy the YAML workflow template into your repository’s .github/workflows
directory.
You need to replace the $default-branch
placeholder as appropriate.
Your repository needs to be public or you need GitHub Advanced Security. Uploading the report will fail with an error otherwise. |
The scan fails to execute with the following error message:
Called workflows cannot be queued onto self-hosted runners across organisations/enterprises. Failed to queue this job. Labels: 'ubuntu-latest'.
As of March 2022, GitHub seems to rate limit actions. If this error message appears, you are being rate-limited. You can manually restart the scan.
The workflow has a startup failure with an error message like this:
jenkins-infra/fetch-codeql-action@v1 is not allowed to be used in jenkinsci/your-plugin.
In cases of errors like this, review Settings » Code and automation » Actions » General » Action permissions in your repository.
Select either Allow all actions and workflows or Allow jenkinsci, and select non-jenkinsci, actions and workflows.
If you select the latter, add jenkins-infra/*
to the list of specified actions and workflows being allowed.
The workflow has a startup failure with an error message like this:
The workflow is not valid. .github/workflows/jenkins-security-scan.yml (Line: 11, Col: 3): Error calling workflow 'jenkins-infra/jenkins-security-scan/.github/workflows/jenkins-security-scan.yaml@v2'. The workflow 'jenkins-infra/jenkins-security-scan/.github/workflows/jenkins-security-scan.yaml@v2' is requesting 'actions: read, security_events: write', but is only allowed 'actions: none, security_events: none'.
This can happen if your repository is configured to limit workflow permissions to read-only access by default, and you’re using an older version of the workflow that does not declare the permissions it requires.
Compare with the template file and ensure you have the same permissions
element in your workflow.
The Upload Scan Results step in the workflow fails with the error:
Error: Workflows triggered by Dependabot on the "push" event run with read-only access. Uploading Code Scanning results requires write access. To use Code Scanning with Dependabot, please ensure you are using the "pull_request" event for this workflow and avoid triggering on the "push" event for Dependabot branches. See https://docs.github.com/en/code-security/secure-coding/configuring-code-scanning#scanning-on-push for more information on how to configure these events.
You’re using an older version of the workflow that does not declare the permissions it requires.
Compare with the template file and ensure you have the same permissions
element in your workflow (see documentation).
The Jenkins Security Scan check is successful even though the pull request introduces new issues.
Only some findings mark the check as failed. The behavior can be customized in the repository configuration. Go to Settings » Security » Code security and analysis » Code scanning » Check Failure and select the behavior you want.
The Upload Scan Results step in the workflow fails with the error:
Error: Advanced Security must be enabled for this repository to use code scanning.
This happens for private repositories that do not have GitHub Advanced Security enabled. Review Settings » Security » Code security and analysis » GitHub Advanced Security in your repository and ensure that it is enabled. This section of the configuration is only visible if you have an appropriate GitHub paid plan.
The custom GitHub workflow is hosted in jenkins-infra/jenkins-security-scan
, alongside the wrapper script that invokes the CodeQL CLI.
Please file an issue there to provide feedback for the workflow and its use of actions.
To provide feedback about the findings, please file an issue in jenkins-infra/jenkins-codeql
.
Improvements to the code scanning rules are also welcome.