-
Notifications
You must be signed in to change notification settings - Fork 9
docs: label ZAP scans as wAVA, update README #2583
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: label ZAP scans as wAVA, update README #2583
Conversation
Clarify that weekly OWASP ZAP active scans cover wAVA-style web app vulnerability assessments, and align report issue titles accordingly. Refs: bcgov#2023 Co-authored-by: derek.roberts <[email protected]>
Add a scheduled workflow that opens a reminder issue to schedule Psicurity wAVA (manual OWASP ASVS-based pentest). Also revert ZAP job naming back to ZAP and document both in the README. Refs: bcgov#2023 Co-authored-by: derek.roberts <[email protected]>
This reverts commit 3b7e59d.
This reverts commit 82983b2.
Co-authored-by: derek.roberts <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull request overview
This PR aims to address issue #2023 by explicitly labeling existing OWASP ZAP security scans as "wAVA (Web Application Vulnerability Assessments)" to fulfill routine security assessment requirements. However, the PR appears incomplete.
Changes:
- Updated README.md to document that the Scheduled workflow includes wAVA-style OWASP ZAP vulnerability scanning
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
| * 🧹 PR environment purge | ||
| * 📚 Generate SchemaSpy documentation | ||
| * 🧪 Tests (e2e, load, integration) on TEST deployment | ||
| * 🛡️ OWASP ZAP active scans on TEST routes (fulfills the wAVA need; see issue #2023) |
Copilot
AI
Jan 15, 2026
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The PR description states that changes were made to .github/workflows/scheduled.yml to update the job name to "wAVA (ZAP) Scans" and the issue title prefix to "wAVA (ZAP) Security Report: ...", but these workflow changes are not included in this PR. The README.md is documenting functionality that hasn't been implemented yet. Either the workflow file changes need to be added to this PR, or the README.md should be updated to reflect the current state (where the job is simply named "ZAP Scans" without the wAVA prefix).
| * 🛡️ OWASP ZAP active scans on TEST routes (fulfills the wAVA need; see issue #2023) | |
| * 🛡️ OWASP ZAP active scans on TEST routes |
chore(ci): Label ZAP scans as wAVA and update README
Description
This PR addresses issue #2023, which requested routine Web Application Vulnerability Assessments (wAVA).
The existing OWASP ZAP active scans in the
scheduled.ymlworkflow have been explicitly labeled as "wAVA (ZAP) Scans" to satisfy this requirement. The issue titles generated by these scans are now prefixed with "wAVA (ZAP) Security Report: ...".Additionally, the
README.mdhas been updated to accurately document that the Scheduled workflow includes wAVA-style web app vulnerability scanning via OWASP ZAP, replacing outdated information about other tests.Fixes #2023
Type of change
How Has This Been Tested?
.github/workflows/scheduled.ymlcorrectly update the job name and issue title prefix.README.mdaccurately reflects the wAVA scanning.Checklist
Further comments