Skip to content

Feature/lab7#7

Open
ellilin wants to merge 9 commits intomainfrom
feature/lab7
Open

Feature/lab7#7
ellilin wants to merge 9 commits intomainfrom
feature/lab7

Conversation

@ellilin
Copy link
Copy Markdown
Owner

@ellilin ellilin commented Mar 22, 2026

Goal

Complete Lab 7 by analyzing the OWASP Juice Shop container image for vulnerabilities, auditing Docker host security against the CIS Docker Benchmark, and comparing secure deployment configurations with different runtime hardening levels.

Changes

  • Added labs/submission7.md with complete analysis for Tasks 1-3, including Docker Scout, Snyk, Dockle, CIS benchmark, and deployment hardening findings
  • Added lab artifacts under labs/lab7/ for scanning results, Docker Bench output, deployment comparison output, and the seccomp profile used for the production run
  • Captured and documented environment-specific execution details on macOS Docker Desktop, including the Docker Bench host-script run and explicit default seccomp profile usage

Testing

  • Ran docker scout cves bkimminich/juice-shop:v19.0.0 and saved the output to labs/lab7/scanning/scout-cves.txt
  • Ran Dockle against bkimminich/juice-shop:v19.0.0 and saved the output to labs/lab7/scanning/dockle-results.txt
  • Ran Snyk container scanning with a valid token and saved the output to labs/lab7/scanning/snyk-results.txt
  • Ran Docker Bench for Security via the upstream host script and saved the output to labs/lab7/hardening/docker-bench-results.txt
  • Deployed three Juice Shop profiles (default, hardened, production), verified all returned HTTP 200, captured docker stats and docker inspect output, then cleaned up the containers

Artifacts & Screenshots

  • Submission report: labs/submission7.md
  • Docker Scout results: labs/lab7/scanning/scout-cves.txt
  • Snyk results: labs/lab7/scanning/snyk-results.txt
  • Dockle results: labs/lab7/scanning/dockle-results.txt
  • Docker Bench results: labs/lab7/hardening/docker-bench-results.txt
  • Deployment comparison: labs/lab7/analysis/deployment-comparison.txt

Checklist

  • Clear title following conventional commits (e.g., feat:, fix:, docs:)
  • Documentation updated if needed
  • No secrets or large temporary files included

ellilin and others added 9 commits February 9, 2026 15:59
Complete triage report for OWASP Juice Shop deployment including:
- Scope & Asset information (v19.0.0)
- Environment details (macOS, Docker 28.3.3)
- Deployment verification with health checks
- Surface snapshot analysis
- Top 3 security risks identified
- PR template setup documentation
- GitHub community engagement section
- Generate SBOMs with Syft and Trivy for OWASP Juice Shop v19.0.0
- Perform SCA with Grype and Trivy vulnerability scanning
- Compare toolchain capabilities: accuracy, coverage, features
- Analyze 1139 packages, 146 vulnerabilities, 32 license types
- Document critical vulnerabilities and remediation strategies

Co-Authored-By: Claude (glm-5) <noreply@anthropic.com>
- SAST analysis with Semgrep (25 code-level findings)
- DAST analysis with ZAP, Nuclei, Nuclei, SQLmap
- Authenticated vs unauthenticated scan comparison
- Tool comparison matrix and recommendations
- SAST/DAST correlation analysis
…lysis

- Scanned Terraform with tfsec, Checkov, and Terrascan (45, 78, 22 findings)
- Scanned Pulumi with KICS (6 findings: 1 CRITICAL, 2 HIGH, 1 MEDIUM)
- Scanned Ansible with KICS (10 findings: 9 HIGH, 1 LOW)
- Created comprehensive tool comparison matrix
- Identified 161 total security vulnerabilities across all frameworks
- Documented top 5 critical findings with remediation code examples
- Provided CI/CD integration strategy with quality gates
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant