This is a guide to setting up and configuring PyUp to scan your BitBucket repositories for dependency security vulnerabilities. This enables you to configure security and compliance scans on your repositories on new commits, new branches, pull requests, and more.
You can set up PyUp to run security scans on your Python repositories in BitBucket using BitBucket pipelines.
To scan any systems for security vulnerabilities you first need a PyUp API key. You can create a PyUp account and get your API key here.
BitBucket pipelines are an easy and powerful way to run CI/CD processes on your codebases hosted on BitBucket. Adding PyUp security scans to your repositories is as easy as adding a few lines of code to your BitBucket pipeline configuration file to install Safety (our command-line tool) and then run Safety.
We've created some full pipeline examples below if you don't have one set up yet. If you need help configuring your pipeline, you can read more on getting startup with BitBucket pipelines as well as setting up BitBucket pipelines in Python projects.
BitBucket pipelines are configured using a
bitbucket-pipelines.yml YAML file at the root of your BitBucket repository. Here is an example YAML file that installs and runs Safety to scan your Python environment for security vulnerabilities.
# PyUp Security Scans Template # This template allows you to run security scans on your Python dependencies. # The workflow allows running tests on the default branch. image: python:3.8 pipelines: default: - parallel: - step: # Run Safety to scan your Python Environment (recommended and best practice) name: PyUp Security Scan on the Python Environment script: # Install Safety - PyUp's command-line tool - pip install safety # Install your Python dependencies as per usual. # This example uses requirements.txt and pip, but you may use Poetry with its Pipfiles, or pipenv with its pyproject.toml file. - pip install -r requirements.txt # Run safety to scan the local Python environment. This will scan all installed dependencies, including any transitive dependncies that get installed during your installation - safety check --key $PYUP_API_KEY
Your pipeline YAML file will likely end up running other tests and actions and deployments. All you have to do to ensure that Safety is scanning your dependencies for security vulnerabilities is to ensure that the following code (script) is in your YAML file amongst your other tests and scripts that are running.
... script: # Install Safety - PyUp's command-line tool - pip install safety # Install your Python dependencies as per usual. # This example uses requirements.txt and pip, but you may use Poetry with its Pipfiles, or pipenv with its pyproject.toml file. - pip install -r requirements.txt # Run safety to scan the local Python environment. This will scan all installed dependencies, including any transitive dependncies that get installed during your installation - safety check --key $PYUP_API_KEY
Your safety script requires the PyUP API key to connect to PyUp and get the latest commercial vulnerability database. To link up this API key to the $PYUP_API_KEY variable defined in your pipeline YAML file (example above), you need to add your PyUp API key as a BitBucket repository variable. To do this, navigate to your repository on BitBucket, then Repository settings then the Repository variables sub-menu.
Once added, the new variable should display like the screenshot below on the BitBucket repository variable page:
That's it! You now have a fully working BitBucket pipeline that will run and scan your Python dependencies for security vulnerabilities on new pushes and pull requests using PyUp's commercial vulnerability database.
If there is a vulnerability found Safety will return a non-zero exit code and fail the test. You can then see the pipeline's output in Bitbucket to see what Safety found and how to patch the vulnerabilities. Here is our example running on a new pull request:
There are many more configuration options on BitBucket Pipelines. For example, you can set up this Pipeline to only run on certain branches, or run when other conditions are met. You can also configure it to run periodically using a cron so that your repository is scanned for security vulnerabilities every hour or every day, not just when new code is committed.
You can read more about BitBucket's pipelines on their documentation page.
PyUp's Safety Command-line Tool
These scans use PyUp's Safety Command-Line tool, which has many options and configurations to meet your needs. Instead of scanning your local environment after you've installed your dependencies, you can also configure it to scan specific requirements files, output different formats, or even scan for license compliance issues.
You can read more about Safety and how to use it on its Github page.
Updated 2 months ago