Jacked
Introduction
Jacked provides organizations with a more comprehensive look at their application to take calculated actions and create a better security approach. Its primary purpose is to scan vulnerabilities to implement subsequent risk mitigation measures.
This jenkins plugin scans a given target and expose vulnerability.
Getting started
This jenkins plugin installs jacked binary tool in the job workspace directory and performs scan.
Auto-install & Update Binary Jacked
The plugin will install the "jacked" binary tool. (Windows and Linux Supported)
- Auto-update: If checked, the binary will automatically update when a new release is available.
- Uses Scoop for Windows
- Uses Shell Script for Linux
Usage as add build step
Plugin Configuration
Output
Provides the following:
Quiet Mode
: Removed verbiage.- Show a list of packages.
Analyzing BOM
: Showing vulnerabilities found and providing recommendations to fix them.- Show CI Assessment Result: Pass or Fail based on the selected fail criteria severity type.
- Saves output file on the workspace in every build.
jacked_result_$(JOBNAME)_$(BUILDNUMBER).txt
Plugin Configuration Fields and Descriptions
Scan Type
Description: Specified the input on scan field based on the selected scan type.
Option:
Image
: Provide the image to be scanned.Directory
: Provide the target directory path to be scanned.Tar File
: Provide the target tar file path to be scanned.SBOM File
: Provide the target Diggity JSON Format SBOM file path to be scanned.
Scan
Input: Image name, Directory path, tar file path, or sbom file path.
Fail Criteria Severity
Description: Select a threshold that will fail the build when equal to or above the severity found in the results.
Option:
- Critical
- High
- Medium
- Low
- Negligible
- Unknown
Ignore Package Names
Usage: Ignore the following package names when scanning. Leave blank if not using.
Example Input Format: dpkg,tar,gzip,...
Ignore CVEs
Usage: Ignore the following CVEs when scanning. Leave blank if not using.
Example Input Format: CVE-2022-24775,CVE-2022-1304,TEMP-0000000-6F6CD4,...
Skip Build Fail
Default value is false / unchecked
.
Warning: If the value is checked, it will restrict the plugin from failing the build based on the assessment result.
Skip Database Update
Default value is false / unchecked
.
Warning: If the value is checked, it will skip check database update while scanning.
Usage as Pipeline
pipeline {
agent any
stages {
stage('Jacked Scan') {
steps {
script {
jacked scanType: 'image', // Choose Scan Type: image, directory, tar, or sbom.
scanName: 'ubuntu', // Input: Image name, Directory path, tar file path, or sbom file path.
severityType: 'high', // Select a threshold that will fail the build when equal to or above the severity found in the results.
// Severity: critical, high, medium, low, negligible, unknown.
skipFail: false, // Default as false. Skip build to fail based on the assessment.
skipDbUpdate: false, // Default as false. Skip Database Update when scanning.
ignorePackageNames: '', // Ignore Package names when scanning... e.g. input: dpkg,tar,bash,...
ignoreCves: '' // Ignore CVES when scanning... e.g. input: CVE-2022-1271,CVE-2022-3715,CVE-2022-1664,...
}
}
}
}
}
LICENSE
Licensed under MIT, see LICENSE