Hamburger Icon

Test-Driven Security
With StackHawk, Travis CI
and Docker Compose


Zachary Conger|July 17, 2020

Build a live security test environment within a Travis CI build pipeline, and scan your applications for security vulnerabilities each time you check in code.

Build a live security test environment within a Travis CI build pipeline, and scan your applications for security vulnerabilities each time you check in code.

test-driven-security-with-travis-ci-and-docker-compose-img-1 image

Every time you commit and push software changes, you should be building and testing it for bugs. That includes security bug testing against a live integration environment, so you can be aware of any new bugs as they are introduced, and before they go to production. Here’s a step-by-step guide to accomplishing that in a fully automated way using StackHawk and Travis CI.

In this tutorial, we will build and containerize an intentionally flawed Django app called vuln_django, based on the Django Tutorial series. We will stand up an integration environment complete with an Nginx front-end and a PostgreSQL database backend using Docker Compose. Finally, we will test our app for security vulnerabilities using StackHawk. And we will do all of this in a self-contained Travis CI build environment, triggered by pushes to GitHub.

Ready to Test Your App

Getting Started

You will need accounts with StackHawk, Travis CI, and GitHub. You will also need some familiarity with Git and Docker. Familiarity with Python and Django is helpful, but not necessary.

You should have the following software installed on your computer.

Fork and Clone vuln_django_play

Fork a copy of the vuln_django_play repository to your own GitHub account. Then clone the fork to your workstation. This repo already contains all of the automation that we will be creating in this tutorial and more. Since that’s what we want to create, remove it by running the script,

cd vuln_django_play

Now try running vuln_django locally to verify that it works.

python3 -m venv env<br>$ source env/bin/activate
pip install -r requirements.txt
python migrate
python createsuperuser
python seed polls --number=5
python test
python runserver

Browse to and you should see the vuln_django polling application! The strange polls you see were generated in the seed step above, and the poll data is stored in a SQLite database that was created with the migrate step.

Hit <ctrl>-c to stop the development server.

Containerize vuln_django

Rather than running the development server, let’s run the app with Gunicorn for better performance, and to better simulate a production environment. And for portability, let’s containerize it.

Create a Dockerfile at the base of your cloned repo with the following contents.

# Create the base stage
FROM python:3.7-buster as base

COPY requirements.txt /opt/app/
COPY vuln_django/ /opt/app/vuln_django/vuln_django
COPY static/ /opt/app/vuln_django/static
COPY templates/ /opt/app/vuln_django/templates
COPY polls/ /opt/app/vuln_django/polls
COPY /opt/app/vuln_django/

RUN pip install -r /opt/app/requirements.txt

# Create the micro stage to run as a gunicorn container
FROM base as micro
RUN apt-get update && \
    apt-get install -y --no-install-recommends \
WORKDIR /opt/app/vuln_django
CMD exec gunicorn vuln_django.wsgi --bind${SERVER_PORT} --workers 3

Build the container image and run it to make sure you get the same results as when you ran the app manually.

docker build . --tag vuln_django:micro
docker run --rm --detach --publish 8010:8010 --name vuln-django vuln_django:micro
docker exec vuln-django python migrate
docker exec -it vuln-django python createsuperuser
docker exec vuln-django python seed polls --number=5
docker exec vuln-django python test

Browse to the containerized app server at http://localhost:8010/, and once again you should see some polls. Go to http://localhost:8010/admin/ and log on with the superuser credentials you created, and check out the Django admin interface.

Notice how we ran migrations, seed data, and tests as docker exec commands. As before, those commands created a SQLite database file, this time within the container, and populated it with seed data.

Cool! Shut it down.

docker stop vuln-django

Since we used the --rm flag to docker run, the container goes away, along with all of its data. If you started it again, you would again need to run migrations, create the superuser, and seed the data for the app to work.

Build a Docker Compose Configuration

Let’s make this look more like a real application environment by assembling some supporting services in Docker Compose. We will add an Nginx container to host static files and forward requests to our app, and we’ll add a PostgreSQL database to host the polling data.

Create a file, docker-micro.yml and add the following contents:

version: "3.7"

    image: nginx
      - ./nginx.conf.micro:/etc/nginx/nginx.conf:ro
      - ./static:/opt/app/vuln_django/static:ro
      - 8020:8020
      - vuln-django

    image: vuln_django:micro
          context: .
          target: micro
      - db
      - DJANGO_SUPERUSER_PASSWORD=adminpassword
      - SQL_ENGINE=django.db.backends.postgresql
      - SQL_HOST=db
      - SQL_PORT=5432
      - SQL_DATABASE=django_db
      - SQL_USER=django_user
      - SQL_PASSWORD=django_password

    image: postgres
    restart: always
      - POSTGRES_DB=django_db
      - POSTGRES_USER=django_user
      - POSTGRES_PASSWORD=django_password

Notice that the vuln-django service requires the container image, vuln_django:micro. The build section specifies where to find the Dockerfile for vuln_django:micro, and which target stage to build. Recall we added a micro stage to the Dockerfile above.

Under services.vuln-django.environment, we populate several variables to tell the vuln-django service how to connect to its database, and how to create a superuser account for the Django Admin interface. Notice that SQL_HOST is set to db, which is the name of our PostgreSQL service defined in services.db.

The db service uses the official postgres image, and we configure the database, username, and passwords with environment variables.

Finally, the vuln-proxy service is an official Nginx container with a custom configuration nginx.conf.micro. This configuration serves custom static content from the /static directory, mounted as a volume from the ./static directory in the project repo, and forwards all other requests to http://vuln-django:8010. We publish port 8020 as a convenience so that we can test this service locally.

Build and run this Docker Compose configuration.

docker-compose --file docker-micro.yml build
docker-compose --file docker-micro.yml up --detach

Run migrations and setup as before, using docker-compose to exec the commands on the vuln-django service container.

docker-compose --file docker-micro.yml exec vuln-django python migrate
docker-compose --file docker-micro.yml exec vuln-django python createsuperuser --no-input
docker-compose --file docker-micro.yml exec vuln-django python seed polls --number=5
docker-compose --file docker-micro.yml exec vuln-django python test

Now that the database has been configured and seeded, click around to see how it looks at http://localhost:8020/polls/. You should see a new waving Pikachu in the background, since we are now serving extra static content from the Nginx proxy service.

Great! Now shut your stack down and remove all of the containers.

docker-compose --file docker-micro.yml down

Add Automation

This is looking good, but there are a lot of steps to build this stack and run it. Let’s script what we have done so far.

Create a file in your project called scripts/, and add the following content.

#!/usr/bin/env bash
# Build and run vuln-django with Nginx and PostgreSQL
set -ex

# We'll use this `docker-compose exec` command a lot...
EXEC_CMD='docker-compose --file docker-micro.yml exec vuln-django'

# Build docker images, in particular the vuln-django container
docker-compose -f docker-micro.yml build

# Launch the app, PostgreSQL and Nginx
docker-compose -f docker-micro.yml up --detach

# Wait for the database, using netcat to ping it
echo Wait for database to become available...
while ! ${EXEC_CMD} bash -c 'nc -z "${SQL_HOST}" "${SQL_PORT}"'; do
  sleep 0.5
echo Database ready!

# Run database migrations to build tables
${EXEC_CMD} python migrate

# Create Django admin user from DJANGO_SUPERUSER_ environment variables
${EXEC_CMD} python createsuperuser --no-input

# Seed database with test data
${EXEC_CMD} python seed polls --number=5

# Run unit tests
${EXEC_CMD} python test

Make the script executable.

chmod 755 scripts/

Now bring the whole stack up like so.


And again, tear it down.

docker-compose --file docker-micro.yml down

Try that a few more times, and click around the app to make sure it all looks good.

Add HawkScan

Create a stackhawk.yml file and add the following content. Be sure to replace <STACKHAWK_APP_ID> with your own StackHawk application ID. Check your app list if you need to find or create one.

  applicationId: <STACKHAWK_APP_ID>
  env: ${APP_ENV:Travis CI}
  host: ${HOST:http://localhost:8020}
  riskLevel: MEDIUM
  appDataType: PII
  antiCsrfParam: csrfmiddlewaretoken
    - /admin/logout/ # the scanner will log itself out if you don't ignore here
    - /admin/password_change/
    loggedInIndicator: "\\QLog Out\\E"
    loggedOutIndicator: "\\Qlogin-form\\E"
      path: /admin/auth/user/
      type: HEADER
      success: ".*200.*"
        - "token"
        - "csrftoken"
      type: FORM
      loginPath: /admin/login/
      logoutPath: /admin/logout/
      usernameField: username
      passwordField: password
        - name: next  # The login form parameter is needed to make login work
          val: "/admin/"
      scanUsername: admin # You created this user with the 'createsuperuser' command. Enter that info here
      scanPassword: adminpassword
    base: false
    - "spider.processform=true"
    - "spider.postform=false"
    - "spider.handleParameters=IGNORE_VALUE"

This configuration lets HawkScan know where to find the app, how to log in and log out, and whether to spider the app to find more routes. We turned spidering off for now to make sure the scan doesn’t take too long. Check the HawkDocs to learn more about all of the HawkScan options.

Fire up your app stack.


Now run the HawkScan container to scan it. Replace <STACKHAWK_API_KEY> with your StackHawk API key.

docker run --tty --volume $(pwd):/hawk --env API_KEY=&lt;STACKHAWK_API_KEY&gt; stackhawk/hawkscan:latest

You should see logs indicating a HawkScan is in progress. Check your StackHawk console for scan results.

HawkScan in Docker Compose

To add HawkScan to the Docker Compose stack, add a supplemental Docker Compose configuration. We will overlay it on top of the stack configuration above. This gives us the ability to automate our database migration between standing up the stack and scanning it.

Create a new Docker Compose file to your project called docker-micro-scan.yml and add the following content:

version: "3.7"
    image: stackhawk/hawkscan:latest
      - APP_ENV=Travis CI
      - HOST=http://vuln-proxy:8020
      - .:/hawk

      driver: none

      driver: none

Replace <STACKHAWK_APP_ID> in the configuration above with your StackHawk application ID. To populate the API key at run time, export an environment variable HAWK_API_KEY with your StackHawk API key.


Let’s walk through the process of building, running, preparing, and then scanning the vuln_django stack.

docker-compose -f docker-micro.yml -f docker-micro-scan.yml down
docker-compose -f docker-micro.yml -f docker-micro-scan.yml up --abort-on-container-exit

Again, you should see logs indicating a HawkScan is in progress. Check your HawkScan console for scan results.

When the scan is complete, shut the stack down and remove all of the containers.

docker-compose -f docker-micro.yml -f docker-micro-scan.yml down

Try running it again from start to finish.

Build and Scan in Travis CI

If you haven’t already, activate your project repository with Travis CI. Follow the Travis CI tutorial if necessary.

Add your StackHawk API key as a secret environment variable under your project in Travis CI. From your project, find the More options menu, and select Settings.

test-driven-security-with-travis-ci-and-docker-compose-img-2 image

On the Settings page, add your API key as a variable called HAWK_API_KEY, to match the environment variable you used in docker-micro-scan.yml.

test-driven-security-with-travis-ci-and-docker-compose-img-3 image

At the base of your project, create a Travis CI configuration file, .travis.yml, and add the following.

language: generic
  - docker
    - stage: build-and-test
      name: Build and Test
        - scripts/
        - docker-compose --file docker-micro.yml --file docker-micro-scan.yml up --abort-on-container-exit

Commit and push all of your changes up to GitHub.

git add .
git commit -m "automated everything"
git push

Through the magic of gitops, Travis should detect the updates to your repository and trigger a build with your new configuration. Because we added the HawkScan step to the after_success phase of the build-and-test job, it will not block your build if it exits non-zero.

Check your project in Travis CI and watch the build run. After all of the containers have been built, pulled, and run, you should see HawkScan kick off. Check your StackHawk scans console and watch for your results.

Add Automated Security Testing to Your Pipeline


Security testing can be hard. But as a developer, you are in a great position to add it as an automated process in your CI/CD pipeline. And what you just created is a way to do it without the need for additional AWS resources or standing environments. It all happens in the Travis build environment.

If you haven’t already, you should integrate StackHawk with Slack so your team can receive notifications any time new findings are detected. And within the StackHawk platform, you should assign, accept, or mark findings as false positives, so you don’t have to see the same alerts over and over.

Thanks for reading!

Zachary Conger  |  July 17, 2020

Read More

Add AppSec to Your CircleCI Pipeline With the StackHawk Orb

Add AppSec to Your CircleCI Pipeline With the StackHawk Orb

Application Security is Broken. Here is How We Intend to Fix It.

Application Security is Broken. Here is How We Intend to Fix It.

Using StackHawk in GitLab Know Before You Go (Live)

Using StackHawk in GitLab Know Before You Go (Live)