sast-configuration by wshobson/agents
npx skills add https://github.com/wshobson/agents --skill sast-configuration静态应用程序安全测试(SAST)工具的设置、配置和自定义规则创建,用于跨多种编程语言的全面安全扫描。
此技能为设置和配置 SAST 工具(包括 Semgrep、SonarQube 和 CodeQL)提供全面指导。在您需要时使用此技能:
# Semgrep 快速开始
pip install semgrep
semgrep --config=auto --error
# 使用 Docker 运行 SonarQube
docker run -d --name sonarqube -p 9000:9000 sonarqube:latest
# CodeQL CLI 设置
gh extension install github/gh-codeql
codeql database create mydb --language=python
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
# GitHub Actions 示例
- name: Run Semgrep
uses: returntocorp/semgrep-action@v1
with:
config: >-
p/security-audit
p/owasp-top-ten
# .pre-commit-config.yaml
- repo: https://github.com/returntocorp/semgrep
rev: v1.45.0
hooks:
- id: semgrep
args: ['--config=auto', '--error']
./scripts/run-sast.sh --setup --language python --tools semgrep,sonarqube
# 详细示例请参见 references/semgrep-rules.md
rules:
- id: hardcoded-jwt-secret
pattern: jwt.encode($DATA, "...", ...)
message: JWT secret should not be hardcoded
severity: ERROR
# PCI-DSS 重点扫描
semgrep --config p/pci-dss --json -o pci-scan-results.json
| 工具 | 最适合 | 语言支持 | 成本 | 集成 |
|---|---|---|---|---|
| Semgrep | 自定义规则,快速扫描 | 30+ 种语言 | 免费/企业版 | 优秀 |
| SonarQube | 代码质量 + 安全 | 25+ 种语言 | 免费/商业版 | 良好 |
| CodeQL | 深度分析,研究 | 10+ 种语言 | 免费(开源) | GitHub 原生 |
每周安装量
3.2K
代码仓库
GitHub 星标数
32.2K
首次出现
2026年1月20日
安全审计
安装于
claude-code2.5K
opencode2.4K
gemini-cli2.4K
cursor2.3K
codex2.3K
github-copilot2.0K
Static Application Security Testing (SAST) tool setup, configuration, and custom rule creation for comprehensive security scanning across multiple programming languages.
This skill provides comprehensive guidance for setting up and configuring SAST tools including Semgrep, SonarQube, and CodeQL. Use this skill when you need to:
# Semgrep quick start
pip install semgrep
semgrep --config=auto --error
# SonarQube with Docker
docker run -d --name sonarqube -p 9000:9000 sonarqube:latest
# CodeQL CLI setup
gh extension install github/gh-codeql
codeql database create mydb --language=python
# GitHub Actions example
- name: Run Semgrep
uses: returntocorp/semgrep-action@v1
with:
config: >-
p/security-audit
p/owasp-top-ten
# .pre-commit-config.yaml
- repo: https://github.com/returntocorp/semgrep
rev: v1.45.0
hooks:
- id: semgrep
args: ['--config=auto', '--error']
Start with Baseline
Incremental Adoption
False Positive Management
Performance Optimization
Team Enablement
./scripts/run-sast.sh --setup --language python --tools semgrep,sonarqube
# See references/semgrep-rules.md for detailed examples
rules:
- id: hardcoded-jwt-secret
pattern: jwt.encode($DATA, "...", ...)
message: JWT secret should not be hardcoded
severity: ERROR
# PCI-DSS focused scan
semgrep --config p/pci-dss --json -o pci-scan-results.json
| Tool | Best For | Language Support | Cost | Integration |
|---|---|---|---|---|
| Semgrep | Custom rules, fast scans | 30+ languages | Free/Enterprise | Excellent |
| SonarQube | Code quality + security | 25+ languages | Free/Commercial | Good |
| CodeQL | Deep analysis, research | 10+ languages | Free (OSS) | GitHub native |
Weekly Installs
3.2K
Repository
GitHub Stars
32.2K
First Seen
Jan 20, 2026
Security Audits
Gen Agent Trust HubPassSocketPassSnykPass
Installed on
claude-code2.5K
opencode2.4K
gemini-cli2.4K
cursor2.3K
codex2.3K
github-copilot2.0K
Azure 升级评估与自动化工具 - 轻松迁移 Functions 计划、托管层级和 SKU
59,200 周安装