Automated multi-scanner vulnerability detection for CI/CD pipelines with web dashboard
SecureFlow is a comprehensive DevSecOps security scanning orchestrator that integrates multiple industry-standard security tools into a unified platform. It detects vulnerabilities in source code, dependencies, and secrets, presenting findings through both a beautiful CLI and an interactive web dashboard.
Most security tools work in isolation. SecureFlow orchestrates them all:
Your Code β SecureFlow β Semgrep (Code Analysis)
β Trivy (Dependencies)
β TruffleHog (Secrets)
β Unified Report + Dashboard
- π SAST - Semgrep static code analysis
- π¦ SCA - Trivy dependency vulnerability scanning
- π Secret Detection - TruffleHog git history scanning
- π Unified Reporting - Aggregated results from all scanners
- πΎ JSON Export - Machine-readable results for CI/CD
- π Interactive Dashboard - Beautiful web interface
- π Visual Charts - Severity and scanner breakdown
- π¨ Modern UI - Clean, responsive design
- π Detailed Reports - Vulnerability details view
- π¨ Colored Output - Color-coded severity indicators
- π Smart Categorization - By type and severity
- π§ Flexible Options - Run individual or all scanners
| Category | Tool | Severity |
|---|---|---|
| Code Injection | Semgrep | π΄ Critical |
| SQL Injection | Semgrep | π΄ Critical |
| Command Injection | Semgrep | π΄ Critical |
| XSS | Semgrep | π΄ Critical |
| Hardcoded Secrets | Semgrep + TruffleHog | π΄ Critical |
| Path Traversal | Semgrep | π High |
| Vulnerable Dependencies | Trivy | π High |
| Weak Cryptography | Semgrep | π‘ Medium |
| Security Misconfig | Semgrep | π‘ Medium |
| Template Injection | Semgrep | π΄ Critical |
# Clone the repository
git clone https://github.com/kksr1994/SecureFlow.git
cd SecureFlow
# Create virtual environment
python3 -m venv venv
source venv/bin/activate
# Install dependencies
pip install -r requirements.txt
# Verify all tools
python3 cli/main.py check# Check tools
python3 cli/main.py check
# Scan with Semgrep (code analysis)
python3 cli/main.py scan -t /path/to/project -s semgrep
# Scan with Trivy (dependencies)
python3 cli/main.py scan -t /path/to/project -s trivy
# Scan with TruffleHog (secrets)
python3 cli/main.py scan -t /path/to/project -s trufflehog
# Run ALL scanners with unified report
python3 cli/main.py scan -t /path/to/project -s all
# Show all findings
python3 cli/main.py scan -t /path/to/project -s all --all# Start dashboard
python3 dashboard/app.py
# Open browser
# http://localhost:5000βββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β π SECUREFLOW v2.0 π β
β Your DevSecOps Security Scanner Orchestrator β
β Now with 3 Integrated Scanners! β
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
================================================================================
π SECUREFLOW UNIFIED SECURITY REPORT
================================================================================
π Scan Time: 2026-02-16T16:24:05
π§ Scanners Used: Semgrep, Trivy, TruffleHog
π OVERALL SUMMARY:
Total Security Findings: 32
π― By Severity:
π΄ CRITICAL: 12
π HIGH: 2
π‘ MEDIUM: 18
π’ LOW: 0
π By Scanner:
Semgrep (SAST): 27 findings
Trivy (SCA): 4 findings
TruffleHog (Secrets): 1 finding
π‘ RECOMMENDATIONS:
β οΈ 12 CRITICAL issues require IMMEDIATE attention!
π 2 HIGH severity issues should be fixed soon
π‘ 18 MEDIUM issues - plan to address
================================================================================
SecureFlow/
βββ cli/
β βββ main.py # CLI interface
βββ scanners/
β βββ semgrep_scanner.py # SAST scanning
β βββ trivy_scanner.py # Dependency scanning
β βββ trufflehog_scanner.py # Secret detection
βββ aggregator/
β βββ result_aggregator.py # Unified reporting
βββ dashboard/
β βββ app.py # Flask web server
β βββ templates/dashboard.html # Web UI
β βββ static/css/style.css # Styling
βββ data/scans/ # JSON results
βββ docs/LEARNING_LOG.md # Dev journey
βββ test-apps/
β βββ vulnerable-app/ # Insecure examples
β βββ secure-example/ # Secure examples
βββ requirements.txt
- Environment setup (Kali Linux, Python, tools)
- Project structure and architecture
- Tool verification
- Semgrep SAST integration
- CLI tool with colored output
- Found 27 vulnerabilities in test app!
- Trivy dependency scanner
- TruffleHog secret scanner
- Result aggregator and unified report
- Secure coding examples with encryption
- Total: 32 vulnerabilities detected!
- Flask web server
- Interactive HTML dashboard
- Chart.js visualizations
- Severity and scanner charts
- Recommendations display
- Semgrep SAST integration
- Trivy SCA integration
- TruffleHog secret detection
- Multi-scanner orchestration
- Unified security report
- Web dashboard with charts
- Secure coding examples
- CLI with colored output
- PDF report generation
- GitHub Actions integration
- Docker containerization
- Auto-fix suggestions
- Risk scoring algorithm
- Slack notifications
- Custom rule creation
- SARIF format export
# SQL Injection - BAD
sql = f"SELECT * FROM users WHERE name = '{user_input}'"
# Command Injection - BAD
os.system(f'ping -c 1 {user_input}')
# Hardcoded Secret - BAD
API_KEY = "sk_live_abc123"# SQL Injection prevention
cursor.execute("SELECT * FROM users WHERE name = ?", (user_input,))
# Command Injection prevention
subprocess.run(['ping', '-c', '1', host], capture_output=True)
# Secrets management
API_KEY = os.getenv('STRIPE_API_KEY')# .github/workflows/security.yml
name: Security Scan
on: [push, pull_request]
jobs:
security:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Run SecureFlow
run: |
pip install semgrep
python3 cli/main.py scan -t . -s all| Metric | Value |
|---|---|
| Lines of Code | 1,800+ |
| Files Created | 20+ |
| Scanners | 3 |
| Vulnerabilities Detected | 32 |
| Development Days | 4 |
| Commits | 9+ |
The test-apps/vulnerable-app/ directory contains intentionally vulnerable code for educational purposes. All API keys are FAKE test data. See test-apps/secure-example/ for proper security practices.
- Fork the repository
- Create feature branch:
git checkout -b feature/AmazingFeature - Commit:
git commit -m 'Add AmazingFeature' - Push:
git push origin feature/AmazingFeature - Open a Pull Request
MIT License - Copyright (c) 2026 kksr1994
kksr1994 - Security Enthusiast & Developer
- GitHub: @Kali-ai007
- Project: SecureFlow
- Semgrep, Trivy, TruffleHog teams
- OWASP for security resources
- Chart.js for visualizations
β Star this repo if you found it useful!
Built with β€οΈ over 4 intensive days of learning DevSecOps