Your CI/CD is the engine of your DevOps process. Read here how you can easily integrate the Crashtest Security Suite into your CI/CD Pipeline.
Overview
This article first highlights the conceptual integration of our tool, before explaining the webhook functionality. Then we dive deeper into the specific integration in Circle CI, Jenkins, TeamCity, Bamboo, and Travis CI.
Please don’t hesitate to reach out to us if you have any questions or need additional help.
How does the integration work?
- Your developer commits code or triggers your CI/CD pipeline through another event.
- Your CI/CD toolchain deploys your code to your staging/test system.
- After building your staging system, your CI/CD pipeline triggers our scan via webhook.
(Check here on how to create a webhook or look at the next section for webhook scripts) - The Crashtest Security Suite scans your newly built system and launches our attack vector scanners.
- Our software provides reports via the UI or as a report in an .pdf or .junit – format.
These reports can be pulled back in the CI/CD toolchain through the above-mentioned webhook. - Because our reports can be read by machines, you are able to let builds fail based on your own set of rules. Example rules to let builds fail include:
- The number of detected vulnerabilities
- The maximum severity of detected vulnerabilities
If we find a vulnerability, we enable you to quickly fix the detected vulnerabilities through our integrated Wiki with specific code examples to easily remediate vulnerabilities.
If there are no vulnerabilities, your CI/CD toolchain deploys the new code to your production system.
That’s how we make sure you only release secure software.
Let’s now look deeper into the webhook functionality that makes this magic real.
Webhook Functionality
The following script will start the scan for your project and periodically poll the status of the scan. When the scan is finished, the report will be downloaded to the file report.xml. For the examples below, assume that you have stored this file as ./start_crashtest.sh.
#!/usr/bin/env sh # TODO: Set WEBHOOK to webhook ID (without URL) WEBHOOK="aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" API_ENDPOINT="https://api.crashtest.cloud/webhook" # Start Scan and get scan ID SCAN_ID=`curl --silent -X POST --data "" $API_ENDPOINT/$WEBHOOK | jq .data.scanId` echo "Started Scan for Webhook $WEBHOOK. Scan ID is $SCAN_ID." # Refresh Scan status STATUS="100" while [[ $STATUS -le "101" ]] do echo "Scan Status currently is $STATUS (101 = Running)" # Only poll every minute sleep 60 # Refresh status STATUS=`curl --silent $API_ENDPOINT/$WEBHOOK/scans/$SCAN_ID/status | jq .data.status.status_code` done echo "Scan finished with status $STATUS." # Download Report curl --silent $API_ENDPOINT/$WEBHOOK/scans/$SCAN_ID/report/junit -o report.xml echo "Downloaded Report to report.xml"
For other webhook functionalities (i.e. configuring authentication), please see this article.
So, how can you apply that to your existing CI/CD tools?
Circle CI
For Circle CI, we created a complete example that allows you to run an example app, set up your own CI/CD pipeline in Circle CI, and configure rules for failing / passing builds.
Please check out the complete article on our DevSecOps example pipeline here.
Jenkins
In your Jenkinsfile test stage, you can easily define a security test with the Crashtest Security Suite:
Jenkinsfile (Scripted Pipeline) node { stage('Build') { sh 'make' } stage('Test') { sh 'make check' } if (currentBuild.currentResult == 'SUCCESS') { stage('Deploy') { sh 'make publish' } stage('Security') { sh './start_crashtest.sh' } } }
Analog to the webhook script defined above, you can configure the scan and set up your own pass / fail rules. Make sure that the Jenkins JUnit plugin is installed to parse the scan output.
For more information on Jenkins pipelines, please check out the Jenkins documentation.
TeamCity
In TeamCity you can create a new build step where you run the webhook directly or use the script above:

TeamCity Webhook Integration
For more information on TeamCity build steps, please check out their documentation page.
Bamboo
Similar to TeamCity, Bamboo allows you to set up an individual job for your Crashtest Security scan.
If you need an introductory guide on how to set up projects, plans, and jobs, please have a look at this guide.
You can find the Bamboo documentation with more support on the Atlassian help page.
Travis CI
For Travis CI, you can define your build stages in your travis.yml file:
jobs: include: - stage: test script: ./test 1 - # stage name not required, will continue to use `test` script: ./test 2 - stage: deploy script: ./deploy - stage: deploy script: ./start_crashtest.sh
As for the above examples, you can enter your script to start the Crashtest Security Scan and enter pass/fail rules.
For more information on Travis CI, check out their documentation link.