Enterprise Edition

Integrating a CI-driven scan with TeamCity

  • Last updated: October 31, 2024

  • Read time: 3 Minutes

This page contains instructions to integrate a CI-driven scan with TeamCity. This enables you to use Burp Scanner to run web vulnerability scans as a stage in your existing CI/CD pipeline, and fail builds if vulnerability thresholds are met.

You configure the scan by defining a set of simple parameters in a YAML file. To learn how to configure the scan, see Creating a configuration file for a CI-driven scan.

These instructions were tested with TeamCity version 2023.05.

Before you start

You need to complete the following steps before you start:

TeamCity agent requirements

To integrate a CI-driven scan with TeamCity:

  • Your TeamCity agent must have Docker configured to run containers.
  • No plugins beyond the TeamCity defaults are required to run a CI-driven scan in a TeamCity CI/CD pipeline.

For information on the machine specification required to run a CI-driven scan, see System requirements for CI-driven scans.

Creating the settings file

  1. Configure access from TeamCity to the repository where your settings.kts file is stored.
  2. Add the following content to your settings.kts file:

    import jetbrains.buildServer.configs.kotlin.BuildType import jetbrains.buildServer.configs.kotlin.DslContext import jetbrains.buildServer.configs.kotlin.buildSteps.script import jetbrains.buildServer.configs.kotlin.project import jetbrains.buildServer.configs.kotlin.version version = "2022.10" project { description = "Contains all other projects" buildType(ExampleScan) } object ExampleScan : BuildType({ name = "Example Scan" vcs { root(DslContext.settingsRoot) cleanCheckout = true } failureConditions { testFailure = false } features { feature { type = "xml-report-plugin" param("xmlReportParsing.reportType", "junit") param("xmlReportParsing.reportDirs", "+:burp_junit_report.xml") } } steps { script { name = "Example Scan" scriptContent = "docker run --rm --pull=always \ -u $(id -u) -w %system.teamcity.build.checkoutDir% " + "-v %system.teamcity.build.checkoutDir%:%system.teamcity.build.checkoutDir% " + "-e BURP_CONFIG_FILE_PATH=%system.teamcity.build.checkoutDir%/burp_config.yml " + "public.ecr.aws/portswigger/enterprise-scan-container:latest" } } artifactRules = "+:burp_junit_report.xml" })

Setting the configuration of your scan

To set the configuration for your scan, save your configuration file as burp_config.yml in the root of your application.

To learn how to create and edit the configuration file, see Creating a configuration file for a CI-driven scan.

Configuring the TeamCity pipeline

  1. From the main TeamCity interface, click New project and choose an appropriate place in your project hierarchy.
  2. Make sure that Manually is selected.
  3. Give your project a Name. You can also add a Description.
  4. Click Create.

    Configuring the TeamCity pipeline
  5. Click Versioned Settings.
  6. Select Synchronization enabled.
  7. Under Project settings VCS Root, click Create VCS root or use an existing option from the Project Settings VCS root drop-down.
  8. Make sure that the Settings format is set to Kotlin.
  9. Click Apply.
  10. From the Existing Project Settings Detected pop-up, click Import settings from VCS.

    Importing settings

Viewing scan results in TeamCity

To view the results of your scan:

  1. Run your TeamCity project, and wait for the scan to complete. The time the scan takes varies, depending on how the scan is configured.
  2. From the main TeamCity interface, click on the project that you scanned.
  3. Under Example Scan, click on the build that you scanned.
  4. Click Tests. Here you can see any failed tests. See more details of a failed test by clicking on it.

Remediation advice

You can see remediation advice for security issues that Burp Scanner finds under Stacktrace. This includes links to relevant sections of the free Web Security Academy resource, which provide further detail on web security vulnerabilities.

TeamCity remediation advice

Evidence

You can see evidence for security issues that Burp Scanner finds under Stacktrace. This evidence includes the request sent by Burp Scanner to produce the issue, as well as the response sent by the application.

TeamCity evidence

Was this article helpful?