Fortinet black logo

Azure DevOps

Azure DevOps

Following is a sample code segment that can be configured in azure-pipelines.yml file to perform a SAST scan.

Note: Make sure to update the parameters in the sample code according to your environment before using it.

trigger:
    - main
pool:
    vmImage: ubuntu-latest

steps:
    -task: Bash@3
        displayName: Install_Run_SAST
        inputs:
            targetType: 'inline'
            script: |
            env | grep -E "AZURE_HTTP_USER_AGENT|BUILD_BUILDID" > /tmp/env
            docker run --pull always --rm --env-file /tmp/env --mount type=bind,source="$PWD",target=/scan registry.fortidevsec.forticloud.com/fdevsec_sast:latest

Following is a sample code segment that can be configured in azure-pipelines.yml file to perform a DAST scan.

trigger:
    - main
pool:
    vmImage: ubuntu-latest

steps:
    -task: Bash@3
        displayName: Install_Run_DAST
        inputs:
            targetType: 'inline'
            script: |
            env | grep -E "AZURE_HTTP_USER_AGENT|BUILD_BUILDID" > /tmp/env
            docker run --pull always --rm --env-file /tmp/env --mount type=bind,source="$PWD",target=/scan registry.fortidevsec.forticloud.com/fdevsec_dast:latest

Azure DevOps

Following is a sample code segment that can be configured in azure-pipelines.yml file to perform a SAST scan.

Note: Make sure to update the parameters in the sample code according to your environment before using it.

trigger:
    - main
pool:
    vmImage: ubuntu-latest

steps:
    -task: Bash@3
        displayName: Install_Run_SAST
        inputs:
            targetType: 'inline'
            script: |
            env | grep -E "AZURE_HTTP_USER_AGENT|BUILD_BUILDID" > /tmp/env
            docker run --pull always --rm --env-file /tmp/env --mount type=bind,source="$PWD",target=/scan registry.fortidevsec.forticloud.com/fdevsec_sast:latest

Following is a sample code segment that can be configured in azure-pipelines.yml file to perform a DAST scan.

trigger:
    - main
pool:
    vmImage: ubuntu-latest

steps:
    -task: Bash@3
        displayName: Install_Run_DAST
        inputs:
            targetType: 'inline'
            script: |
            env | grep -E "AZURE_HTTP_USER_AGENT|BUILD_BUILDID" > /tmp/env
            docker run --pull always --rm --env-file /tmp/env --mount type=bind,source="$PWD",target=/scan registry.fortidevsec.forticloud.com/fdevsec_dast:latest