Netsparker and GitLab Integration

We are pleased to announce a new function on Netsparker Enterprise, our scalable, multi-user, online web application security solution with built-in enterprise workflow and testing tools. From today, you will be able to integrate Netsparker Enterprise with GitLab, a web-based Git repository manager that provides CI/CD pipeline features.

How the Integration of Netsparker with GitLab Works

Gitlab enables you to add CI configuration to your source control repository using a single file.

How the Integration of Netsparker with GitLab Works

Gitlab uses .gitlab-ci.yml file in the project repository for the CI/CD pipeline features. Whenever changes are made to that repository, GitLab reads the .gitlab-ci.yml file and executes the commands within the gitlab runner’s execution environment, in the order and with the settings described in the file.

You can integrate Netsparker Enterprise with GitLab using cURL scripts. cURL is the defacto command-line tool for transferring data with URLs. Most of the Linux distributions already support cURL. Gitlab’s Linux runners already support it. And for the Gitlab’s Docker runners, it is very easy to add to their docker containers if it is not already installed. This is why we prefer to integrate Netsparker Enterprise with GitLab via cURL. It is very easy to use and accessible. Netsparker Enterprise uses the Integration Script Generator to generate cURL command-line tool scripts to integrate with GitLab. These scripts have been tested and approved for GitLab version 9+. In order to integrate with Netsparker Enterprise, GitLab Runner’s execution environment must support cURL.

Why the Integration of Netsparker with GitLab is Useful

This new feature means you can generate cURL scripts with our Integration Script Generator. You can then use these cURL scripts to enable Netsparker Enterprise’s advanced integration functionality.

For further information, see Integrating Netsparker Enterprise with GitLab.

*** This is a Security Bloggers Network syndicated blog from Netsparker, Web Application Security Scanner authored by Robert Abela. Read the original post at: