Add OpenGrep SAST workflow and security waivers file #3
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Add OpenGrep SAST workflow and security waivers file across 62 repositories
Summary
This bulk operation adds OpenGrep SAST security scanning capability to all active repositories in the Zampfi organization (62 total). Each repository now contains:
.github/workflows/opengrep-sast.yaml- A comprehensive 273-line security scanning workflow that runs on PRs and main branch pushes, using OpenGrep with multiple rule sets (typescript, python, java, go, etc.).security-waivers.json- An empty waivers file for managing security exceptions when legitimate code triggers false positivesThe workflow is designed to block merges when critical/high severity security issues are detected, with a waiver system for handling false positives. 50 PRs have been successfully created with 11-12 remaining due to technical issues.
Review & Testing Checklist for Human
🔴 HIGH RISK - 5 critical items to verify:
.security-waivers.jsonand confirm it properly excludes the specified issue from blockingRecommended test plan:
Diagram
%%{ init : { "theme" : "default" }}%% graph TD A["bulk_pr_automation.py"]:::major-edit --> B[".github/workflows/opengrep-sast.yaml"]:::major-edit A --> C[".security-waivers.json"]:::major-edit A --> D["50+ Repository PRs"]:::major-edit B --> E["GitHub Actions Workflow"]:::context E --> F["OpenGrep Security Scan"]:::context F --> G["Security Report Generation"]:::context C --> H["Waiver Processing"]:::context H --> F D --> I["Expected: security-scan failures"]:::minor-edit D --> J["Some: pre-commit failures"]:::minor-edit subgraph Legend L1[Major Edit]:::major-edit L2[Minor Edit]:::minor-edit L3[Context/No Edit]:::context end classDef major-edit fill:#90EE90 classDef minor-edit fill:#87CEEB classDef context fill:#FFFFFFNotes
/home/ubuntu/repos/herm-frontend/devin/{timestamp}-add-security-filesgit_create_prcommand prevented completion of all 62 repositoriesSession details: Requested by shashvat@zamp.ai
Devin session: https://app.devin.ai/sessions/6b8a3486391f45e0b66ec32758e5f7da