Scan Request File
An add-in tool is based on a scan request file that you define and register with Software
Risk Manager. A scan request file contains the instructions that the tool service needs
to invoke an application security testing tool on the k8s cluster and ingest its output
into Software Risk Manager. Scan request files use the TOML
file format. You can specify any valid TOML content in your tool's scan request file
provided you specify the
request
table, which is a reserved section
with the following parameters.Key | Description | Required? |
---|---|---|
imageName |
The name of the Docker image containing your add-in tool | Yes |
workDirectory |
The work directory where your add-in tool can find tool inputs | Yes |
shellCmd |
The Bourne shell command to invoke your add-in tool | Yes |
resultFilePath |
The output of your add-in tool | Yes |
logFilePaths |
An array of log files produced by your add-in tool | No |
preShellCmd |
An optional command to run prior to invoking the shellCmd | No |
postShellCmd |
An optional command to run after invoking the shellCmd | No |
securityActivities |
The Intelligent Orchestration security activities supported by this tool (e.g., sca, sast, dast) | No |
A tool run ends in an error when either shellCmd, preShellCmd, or postShellCmd return a
non-zero exit code. When the tool service runs an add-in tool, it creates the following
directory structure at the path specified by the value of the
workDirectory
key.Content | Description |
---|---|
/ca-certificates |
A directory containing zero or more certificates that should be considered trusted certificate authorities |
/config/request.toml |
A copy of the tool's scan request file, including any project-specific configuration |
/input |
A directory containing an optional input file |
/volume-secret |
A system directory required for storing tool outputs |
/workflow-secrets |
Zero or more workflow secrets associated with an add-in tool's project configuration |
When the tool service invokes an add-in tool, it provides the tool with a copy of its
scan request file, so the file is a convenient place to store configuration data. After
you register an add-in tool, Software Risk Manager lets you edit TOML content outside
the request
table on a per-project basis, so you can have key values
that vary by project. For example, a DAST tool might have a scan request file with a key
whose value indicates the URL from which to start a scan; the URL can vary from one
Software Risk Manager project to the next.