Skip to content

Commit 5972381

Browse files
committed
update permissions
1 parent 6e8c4cf commit 5972381

File tree

1 file changed

+96
-0
lines changed

1 file changed

+96
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
name: Weekly Data and External Tool Updater
2+
3+
# https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#permissions
4+
permissions:
5+
actions: none
6+
checks: none
7+
contents: none
8+
deployments: none
9+
id-token: none
10+
issues: none
11+
discussions: none
12+
packages: none
13+
pages: none
14+
pull-requests: write
15+
repository-projects: none
16+
security-events: none
17+
statuses: none
18+
19+
on:
20+
schedule:
21+
# Run once a week (e.g., every Monday at 01:00 UTC)
22+
- cron: '0 1 * * 1'
23+
workflow_dispatch: # Allows manual triggering from the Actions tab
24+
25+
jobs:
26+
update-data-files:
27+
runs-on: ubuntu-latest
28+
29+
env:
30+
BUNDLE_WITHOUT: "coverage development pcap"
31+
32+
strategy:
33+
fail-fast: true
34+
matrix:
35+
ruby:
36+
- '3.1'
37+
38+
steps:
39+
- name: Install system dependencies
40+
run: sudo apt-get install libpcap-dev graphviz
41+
42+
- name: Checkout code
43+
uses: actions/checkout@v4
44+
with:
45+
fetch-depth: 0
46+
47+
- uses: ruby/setup-ruby@v1
48+
with:
49+
ruby-version: '${{ matrix.ruby }}'
50+
bundler-cache: true
51+
52+
- name: Run Ruby updater scripts
53+
run: |
54+
ruby tools/dev/update_wordpress_vulnerabilities.rb
55+
ruby tools/dev/update_joomla_components.rb
56+
ruby tools/dev/update_user_agent_strings.rb
57+
ruby tools/dev/check_external_scripts.rb -u
58+
- name: Remove vendor folder # prevent git from adding it
59+
run: rm -rf vendor
60+
61+
- name: Create Pull Request
62+
uses: peter-evans/create-pull-request@v7
63+
with:
64+
token: ${{ secrets.GITHUB_TOKEN }}
65+
commit-message: Update report
66+
base: master
67+
branch: weekly-updates
68+
committer: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
69+
author: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
70+
title: "Weekly Data Update"
71+
draft: false
72+
body: |
73+
This pull request was created automatically by a GitHub Action to update data files and external scripts.
74+
The following tools were run:
75+
- ruby tools/dev/update_wordpress_vulnerabilities.rb
76+
- ruby tools/dev/update_joomla_components.rb
77+
- ruby tools/dev/update_user_agent_strings.rb
78+
- ruby tools/dev/check_external_scripts.rb -u
79+
## Verification
80+
### Wordpress/Joomla Files
81+
- [ ] Do a sanity check, do the additions look legit?
82+
- [ ] Start `msfconsole`
83+
- [ ] `use modules/auxiliary/scanner/http/wordpress_scanner`
84+
- [ ] **Verify** it runs
85+
### JTR Files
86+
- [ ] Do a sanity check, do the additions look legit?
87+
- [ ] See https://docs.metasploit.com/docs/using-metasploit/intermediate/hashes-and-password-cracking.html#example-hashes for hashes and cracking
88+
### SharpHound
89+
- [ ] Start `msfconsole`
90+
- [ ] get a shell on a DC or box connected to a dc
91+
- [ ] `use post/windows/gather/bloodhound`
92+
- [ ] `set session`
93+
- [ ] `run`
94+
- [ ] **Verify** it runs w/o erroring
95+
- [ ] `set method disk`
96+
- [ ] **Verify** it runs w/o erroring

0 commit comments

Comments
 (0)