Using Dalfox in GitHub Actions

This guide provides detailed instructions on how to use Dalfox in GitHub Actions for automated XSS scanning. Follow the steps below to integrate Dalfox into your CI/CD pipeline.

GitHub Marketplace

Dalfox GitHub Actions are available on the GitHub Marketplace:

Getting Started

Basic Usage

To use Dalfox in your GitHub Actions workflow, add the following step to your workflow YAML file:

- name: Dalfox scan
  uses: hahwul/action-dalfox@main
  id: xss-result
  with:
    target: 'https://www.hahwul.com'
    mode: url
    cmd_options: '--follow-redirects'

Parameters

Output Handling

You can handle the output of Dalfox by sending it to Slack, creating a GitHub issue, submitting to JIRA, etc., using the --found-action option.

- name: Dalfox scan
  uses: hahwul/action-dalfox@main
  id: xss-result
  with:
    target: 'https://www.hahwul.com'
    mode: url
    cmd_options: '--found-action "curl -i -k https://hooks.your.system"'
- run: echo "XSS result - $"

For more details on the --found-action option, refer to the Dalfox Found-action documentation.

Sample Workflows

Single URL Scanning

Create a file named xss.yaml in your .github/workflows directory with the following content:

on: [push]

jobs:
  dalfox_scan:
    runs-on: ubuntu-latest
    name: XSS Scanning
    steps:
      - name: Checkout
        uses: actions/checkout@v2
        with:
          ref: master
      - name: Dalfox scan
        uses: hahwul/action-dalfox@main
        id: xss-result
        with:
          target: 'https://xss-game.appspot.com/level1/frame'
          mode: url
          cmd_options: '--follow-redirects'

Multi URL Scanning

For scanning multiple URLs, update the xss.yaml file as follows:

on: [push]

jobs:
  dalfox_scan:
    runs-on: ubuntu-latest
    name: XSS Scanning
    steps:
      - name: Checkout
        uses: actions/checkout@v2
        with:
          ref: master
      - name: Dalfox scan
        uses: hahwul/action-dalfox@main
        id: xss-result
        with:
          target: |
            https://xss-game.appspot.com/level1/frame
            https://www.hahwul.com?q=1234
          mode: pipe