Security Testing Orchestration release notes
These release notes describe recent changes to Harness Security Testing Orchestration (NextGen SaaS).
- Progressive deployment: Harness deploys changes to Harness SaaS clusters on a progressive basis. This means that the features described in these release notes may not be immediately available in your cluster. To identify the cluster that hosts your account, go to your Account Overview page in Harness. In the new UI, go to Account Settings, Account Details, General, Account Details, and then Platform Service Versions.
- Security advisories: Harness publishes security advisories for every release. Go to the Harness Trust Center to request access to the security advisories.
- More release notes: Go to Harness Release Notes to explore all Harness release notes, including module, delegate, Self-Managed Enterprise Edition, and FirstGen release notes.
September 2024
Version 1.108.2
New features and enhancements
- The SonarQube step will now present the code coverage data in Orchestration, Ingestion, and Extraction scan modes, this can be found as an INFO level issue item in your pipeline executions. (STO-7100)
- The Burp Suite Enterprise Edition step has been upgraded to use the
scope_v2
API version instead ofscope
. This update is designed to support server versionv2023.3
, while still maintaining backward compatibility with earlier supported versions. (STO-7955)
August 2024
Version 1.104.3
New features and enhancements
- The Veracode scan step in STO now ignores issues mitigated on the Veracode side, so the scan results exclude any mitigated issues.
- The STO dashboard now includes a new graph to view the Top 5 Vulnerable Targets, showing code repositories, artifacts, instances, and configurations across the account.
- You can now override the security testing scanner image at the step level. Learn more about configuring your pipeline to use images from your registry.
July 2024
Version 1.104.3
New features and enhancements
- You can now override the image that runs the STO step directly in the scanner step UI. Expand Additional Configuration and then set Container Registry and Image Tag. (STO-7724)
- The Bandit, Anchor, and Semgrep steps now support Secure Connect within STO. (STO-7666)
- The dark theme for AIDA is improved. Its appearance is now consistent with other UI components. (STO-7849)
Version 1.103.3
New features and enhancements
-
In the Checkmarx step under the Scan Tool, the fields Team Name and Project Name are now mandatory for step configuration. Previously, these fields were optional. (STO-7681)
-
We now track the number of occurrences for a given issue/scan combination independently of the associated occurrence IDs. Newly created issues will only store up to 1,000 occurrences, with the total number of occurrences being stored separately. Occurrences are stored based on severity, with higher-severity occurrences given priority. (STO-5979)
These following endpoints now include
numOccurrences
at the issue level, showing the total number of occurrences for the issues:GET api/v2/issues/{issueId}
GET api/v2/scans/{scanId}/issue/{issueId}
GET api/v2/scans/{scanId}/issues
Also, the following endpoints now accept an optional payload parameter
numOccurrences
, representing the total number of occurrences associated with the issue:POST api/v2/issues
PUT api/v2/issues/{issueId}
Version 1.102.2
New features and enhancements
- Branch Scanning in SonarQube is now Generally Available(GA), previously behind the
STO_SONARQUBE_BRANCHING
feature flag. Customers can now perform branch scans using the SonarQube step. - Added a new setting called Users can approve their own exemptions. This setting helps control whether users can approve their own exemptions, and it can be easily enabled or disabled based on their preference. Find this setting under Exemption settings on the Default settings page. This is available in the project, organization and account level settings. (STO-7675).
The setting Users can approve their own exemptions is behind the feature flag STO_EXEMPTION_SETTING
. Contact Harness Support to enable this setting.
June 2024
Version 1.100.2
Fixed issue
- Fixed an issue where an Anchore Enterprise step failed when trying to extract scan results in the following edge case. (STO-7754)
- An Anchore user scanned an image (for example,
sto-plugin.v1.2.3
). - An Anchore user then scanned an image with the same digest as
sto-plugin.v1.2.3
but a different name or tag such assto-plugin.latest
. - In this case, the Anchore step could extract results for
sto-plugin.v1.2.3
but any attempts to extract results forsto-plugin.latest
failed with the error "Unable to find matching image."
- An Anchore user scanned an image (for example,
Version 1.99.2
Features that are no longer behind feature flags
The following features are now generally available:
- Built-in scans:
- Default baselines based on regular expressions
- Jira tickets for detected vulnerabilities
- Wiz support for scanning artifacts, code repositories, and IaC repositories
New feature
-
The Semgrep scan step now supports a set of new Scan Configuration settings that enable you to select the set of Semgrep rulesets to include in your scan. (STO-7599)
The following configurations are supported:
- Default Include the following rulesets:
- No default CLI flags Run the
semgrep
scanner with no additional CLI flags. This setting is useful if you want to specify a custom set of rulesets in Additional CLI flags. - p/default Run the scan with the default ruleset configured for the Semgrep scanner.
- Auto only Run the scan with the recommended rulesets specific to your project.
- Auto and Ported security tools Include the following rulesets:
- Auto and Ported security tools except p/gitleaks
Fixed issues
- Audit trails for STO targets and exemptions now display user-friendly resource names instead of IDs. (STO-5717)
Version 1.98.7
New features and enhancements
- Harness STO now supports the Anchore v2 API and Anchore Enterprise Server 5.5.0. This change means that the Anchore v2 API and Anchore Enterprise Server v5.0 or higher are required to run orchestration and extraction scans. (STO-7614)
- You can now run Wiz IaC scans in an Infrastructure stage. (STO-7632)
Fixed issues
- Fixed an issue where Burp scans failed when trying to ingest base64 data that included zero byte and “Symbol Other” UTF-8 characters. (STO-7714)
- Updates to Burp Enterprise orchestration to resolve multiple issues. (STO-7635, ZD-64154)
- Added another API call to resolve a Burp schedule item iD to its corresponding latest Burp scan ID.
- Added logic to perform updates on matching Burp sites rather than trying to create a new Burp site with the same name.
- Removed default port from being set by runner and will only set port if user specifies in the step.
Version 1.97
New feature
- The STO API is now generally available and publicly documented. For more information, go to STO in the Harness API documentation. (STO-5281)
Fixed issues
-
Updates to Burp Enterprise orchestration to resolve multiple issues. (STO-7635, ZD-64154)
- Added another API call to resolve a Burp schedule item iD to its corresponding latest Burp scan ID.
- Added logic to perform updates on matching Burp sites rather than trying to create a new Burp site with the same name.
- Removed default port from being set by runner and will only set port if user specifies in the step.
-
Fixed an issue where a updated runner image caused repository scans to fail in some cases. (STO-7634, ZD-64116)
-
Implemented a fix to improve data processing times for certain edge cases. (STO-7521, ZD-62602, ZD-62694)
May 2024
Version 1.96.2
Breaking change
Harness introduced a back-end dashboard change to support features that are currently in development. As a result, you must re-create any custom dashboards cloned from the Security Testing Dashboard before this change was introduced. If the cloned dashboard has scheduling enabled, you must also re-create the schedule. (STO-7199)
Fixed issues
-
Fixed an issue where running an orchestrated Burp scan resulted in the runtime error
No matching scan configurations
. (STO-7585, ZD-63508) -
Fixed a Jira integration issue that allowed tickets to be created for issues that were not in a target baseline. When the Ticket Summary page was viewed from these tickets, they produced a vague error page. This fix prevents the creation of new non-baseline tickets and improves the error messages shown for existing tickets. (STO-7394, ZD-60778)
-
Fixed a Jira integration issue where setting the default Jira project and issue type in the External Tickets page resulted in duplicated database records and an error response from the ticketing service. (STO-7485)
Version 1.95.0
New features and enhancements
-
The default behavior for Semgrep orchestration scans has changed. Semgrep steps now include the following rulesets. (STO-7560)
Fixed issues
-
Fixed a Prisma Cloud step issue where
twistcli
didn't honor step-level variables when running in Harness Cloud. You can setJOB_NAME
in the Settings field in a Prisma Cloud step, and thereby add a searchable tab in the Prisma Cloud UI. This functionality is now available on Harness Cloud as well as Kubernetes and local build infrastructures. (STO-7508, ZD-61272) -
Fixed an issue where a Wiz step failed when it scanned a package that had policies applied to it but no vulnerabilities. (STO-7573, STO-7575, ZD-63342)
- Fixed an issue where Security Tests showed all detected issues as new when comparing the current scan against the baseline branch, even when the baseline was correctly specified in Test Targets. With this fix, you can simply run an affected pipeline again and produce correct results. (STO-7575, STO-7582, ZD-63551, ZD-73374)
Version 1.94.4
New features
-
You can now use Plugin steps and GitHub Action steps in Security stages without a CI license. (STO-7442)
-
You can now scan code repositories using the Grype scan step. (STO-7531)
Fixed issues
-
Fixed an issue where the Built-in Grype step would time out when uploading scan results. (STO-7464, ZD-61941)
-
Fixed an issue where OPA failed with the error
Unexpected error occurred while evaluating Policies
. With this fix, STO limits the number of occurrences per issue (max 1000) that it sends to OPA. (STO-7562, ZD-63083)
April 2024
UI update 1.15.0
New feature: Built-in SAST scans
This release introduces a new built-in SAST step that adds a preconfigured Semgrep step that's ready to run as soon as you add it. (STO-7180)

-->
New feature: Orchestrated Semgrep scans
Harness STO now supports running Semgrep scans in Orchestration mode. (STO-7142)
STO Manager version 1.22.1
New features and enhancements
-
Harness is in the process of updating the STO UI. The following changes are cosmetic and do not affect the underlying YAML definitions of STO pipelines. Harness expects all of these changes to be deployed in all namespaces by the end of April 2024.
-
The Security Tests stage is now called Security when you add a new stage and select the stage type. (STO-7384)
-
The Custom Scan step is used for scanner integrations that do not have their own configuration step. Previously, this step was called Security. This step also has a new icon. (STO-7385)
Custom Scan appears at the end of the list of Security Test steps in the Step Library.
-
-
Harness STO now supports ingesting scan results in stages that run on ARM64 build infrastructures. This eliminates the need to cache results from a previous ARM64 stage and then ingest them in a stage on a supported platform. (STO-7236)
Fixed issues
- Fixed a UI issue where the Context Name field in the ZAP step did not capture the specified file. (STO-7287)
Version 1.92.1
Fixed issues
-
Fixed an issue with pull-down filters in STO dashboards: If a pipeline had no issues detected, the pipeline would appear in some filters but not others. This fix ensures consistent behavior: all dashboard filters show only pipelines with detected issues. (STO-7179, ZD-58614)
-
Introduced a fix to ensure that Git-triggered pipelines run correctly when the Repository Name is specified as a runtime input. (STO-7029, ZD-55622)
Version 1.90.1
New features and enhancements
- OWASP scan steps can now load Java certificates. (STO-7220)
- The Black Duck Hub scan step has been upgraded to use Synopsis Detect 9.5.0. This is a major feature release with new features, enhancements, and fixed issues. (STO-7353, ZD-60592)
Fixed issues
- Fixed an issue where the Test Targets page would display an error for certain projects. (STO-7399)
- Fixed an issue where spidering in a ZAP scan resulted in the error
Unable to find binary in default location
. (STO-7316) - Fixed an issue where ZAP scans that required authentication resulted in the error
Scanner object has no attribute 'hostname'
. This fix also includes changes to the shared paths where you need to include ZAP scripts in your pipeline. For more information, go to Important notes in the ZAP scanner reference. (STO-7288) - ZAP is no longer a part of OWASP. The UI and documentation have been updated to remove references to OWASP ZAP. (STO-7296)
- Removed “Inactive options are coming soon” from the Request Exemption dialog box. All options in this dialog box are generally available. (STO-7297)
March 2024
Version 189.2
Features that are no longer behind feature flags
The following features are now generally available:
- OPA policies for Security Test results
- Target and variant auto-detection for scanners with configurable UIs
- Open Source Vulnerabilities (OSV) scanner integration
New features and enhancements
-
The AWS Security Hub scan step now supports passing
AWS_SESSION_TOKEN
as an environment variable to support session-based authentication with AWS. You can pass the token as a key-value pair in the Settings field. (STO-6371, ZD-48947) -
Issues tables in Security Tests now include a Target column. (STO-4918)
-
Harness STO now supports ingesting scan results in stages that run on Harness Cloud Windows AMD64 build infrastructures. This eliminates the need to cache results from a previous Windows stage and then ingest them in a Linux stage. (STO-5428)
Fixed issues
-
Fixed an issue with database migrations that impacted upgrading Self-Managed Platform from version 0.13.x to 0.14.x. (STO-7309)
-
Fixed a UI issue in Security Tests when the same issue was detected by multiple scans in the same pipeline. The Issues table showed multiple identical rows for that issue, and clicking on an issue selected all of the identical rows. With this fix, the rows are differentiated by Target. Clicking on an issue selects only that one issue. (STO-4918)
Version 1.88.2
New feature: built-in scanners
-
This release introduces a new set of built-in steps for adding scans to your pipelines quickly and with minimal configuration. The scanners used in these steps are free to STO users and are ready to run as soon as you add them to your pipeline. (STO-6935)
You can add built-in scanners for the following scan types:
-
Secret Detection Add a GitLeaks scan to detect passwords and other secrets in your code repositories.
-
SCA Add an OWASP Dependency Check or OSV scan to detect vulnerabilities in your open-source libraries and packages.
-
Container Add an Aqua Trivy or Anchor Grype scan to detect vulnerabilities in your container images.
-
DAST Add a Zed Attack Proxy (ZAP) scan to detect vulnerabilities in your application instances.
New feature: Wiz scanner integration
You can include Wiz vulnerability scans in your Harness pipelines. Wiz is a cloud security platform that scans IaC templates, container images, and directories/repositories before deployment. Wiz can detect security misconfigurations, vulnerabilities, and exposed secrets. (STO-6035)
Fixed issues
-
Fixed a UI issue that prevented the Exemptions page from loading for some accounts. (STO-7266)
-
Implemented a UI fix to ensure that the STO UI correctly renders scanner output formatted in markdown. (STO-6881)
-
Improved UI wording in the Exemptions table when an exemption applies to multiple issues. (STO-6700)
Version 1.87.4
New feature: Ingest Aqua Security assurance policy violations
The Aqua Security step can now ingest assurance policy violations. These violations appear as INFO-level issues in Security Tests. (STO-7164)
The Aqua Security step also publishes a new output variable, EXTERNAL_POLICY_FAILURES
, that captures the number of assurance policy violations detected by the scan. You can use this variable to enforce governance policies if the pipeline detects any assurance policy violations. (STO-6499)
For more information, go to:
- Workflow description for creating STO governance policies
- Exclude vulnerabilities using STO output variables
New feature: AIDA remediations for STO stage failures
- AIDA remediations are now available for STO stage failures. (STO-6966, STO-7254, ZD-56426, ZD-59425)
Version 1.87.2
New enhancement
- The Pipeline Execution > Security Tests > Issue Details pane now includes a link to the scanned target on the Test Targets page. This link is included for all issues. Previously, only the Exemptions > Issues Details pane included this link. (STO-7114)
Fixed issues
-
Fixed an issue that prevented the Exemptions page from loading in some accounts. (STO-7263, ZD-59507)
-
Fixed an issue in the Test Targets page that delayed UI updates after each keystroke when a user entered a RegEx baseline. (STO-7242)
Version 1.86.1
Early access feature: default regular expressions for target baselines
You can specify default baselines for specific target types: code repositories, container images, application instances, and configurations. STO includes a set of predefined defaults for repository and container image targets. The default baseline for repositories is master
or main
. The default for images is latest
or the most recently scanned Semantic Version number if it can be detected. (STO-7127)
For more information, go to Default RegEx baselines by target type.
Version 1.85.0
New feature: Auto-detect targets and variants
Security Tests steps with configurable UIs, such as Aqua Trivy, Semgrep, and ZAP, now include an auto-detect option for targets and variants. This option eliminates the need to specify the target variant manually. (STO-6704)
- For container images, the step detects the target and variant using the Container Image Name and Tag defined in the step or runtime input.
- For code repositories, the step detects these values using
git
:- To detect the target, the step runs
git config --get remote.origin.url
. - To detect the variant, the step runs
git rev-parse --abbrev-ref HEAD
. The default assumption is that theHEAD
branch is the one you want to scan.
- To detect the target, the step runs
- For application instances, the step detects these values as follows:
- The target is based on the Instance Domain and Path defined in the step or runtime input, for example,
https://qa.jpgr.org:3002/login/us
. - The variant is the timestamp when the step scanned the instance.
- The target is based on the Instance Domain and Path defined in the step or runtime input, for example,
New feature: OPA policies for Security Test results
You can now write and enforce OPA policies against your security tests, and stop your pipelines if a security test has any issues that violate your policies.(STO-6738)
This greatly extends the range of policies that you can use to stop pipelines. Previously, STO only supported OPA policies against severity output variables.
This release includes a set of security test policy samples, which make it easy to create policies such as:
-
A security test cannot include any issues in a list of severities such as Critical or New Critical.
-
A security test cannot include any issues for CVEs past a certain age, for example no critical-severity CVEs more than three years old.
-
A security test cannot include any issues in a list of titles such as
libsqlite3
orjavascript.express.security.audit
. -
A security test cannot include any more than 75 occurrences of TAR-related issues (issue title matches regex
".*tar.*"
). -
A security test cannot include any issues in a list of reference IDs such as CWE-78 or CVE-2023-52138.
For more information, go to Stop pipelines using OPA.
New feature: Open Source Vulnerabilities (OSV) scanner integration
You can scan your code repositories using Open Source Vulnerabilities (OSV), a tool that finds existing vulnerabilities that affect your project's dependencies. (STO-6767)
Fixed issues
-
STO output variables are now supported within nested step groups. (STO-6973, ZD-56586, ZD-58121)
-
Upgraded
twistcli
to version 32.03.123 in the Twistlock scanner image to resolve intermittent 400 response errors. (STO-7223) -
Previously, the ingestion engine assigned a scan type of SAST to all SARIF data by default. As a result, the STO UI would display SARIF scan results as SAST even when they were not. With this fix, the ingestion engine assigns the correct scan type based on the scan results. (STO-7176, ZD-58495)
-
Fixed an issue that would cause a pipeline creation or update to fail if a Security Tests stage used a Harness Code repository. (STO-7208)
-
Fixed an issue where the Aqua Security normalizer copied top-level scan data across all raw issues, which caused the wrong reference identifiers to be shown across all issues in the same scan. This fix ensures that all new Aqua Security issues have the correct reference identifiers and vulnerability data. (STO-7140)
-
With this release, the STO UI shows expiration values for Approved and Expired exemptions only. (STO-6786)
February 2024
Version 1.84.0
Enhancements
-
The Issues table in Issue Details and the Exemptions tables now include popups for issues whose original severities were overridden by a Snyk security policy. (STO-6927)
-
This release includes back-end improvements to ensure that dashboards refresh less than five minutes after a database update. (STO-7084, ZD-57533)
-
This release introduces a new behavior when the baseline for a target changes. (STO-7105)
-
Previous behavior:
When Security Tests showed scan results, it categorized issues as Only in <target>:<variant> and Remediated by comparing the scanned variant to the baseline specified at the time the page was loaded.
-
New behavior:
The baseline for a scan is fixed when STO ingests the results. Only in <target>:<variant> and Remediated issues are based on the baseline specified at the time of the scan.
Harness has introduced this behavior to avoid ambiguous or unexpected results when a target baseline changes. This can happen automatically when a pipeline uses dynamic baselines based on regular expressions. This new behavior also ensures that the Security Tests UI for a given pipeline execution always uses the same criteria to categorize issues as Only in <target>:<variant> and Remediated.
-
Version 1.83.1
Deprecation notice: SonarQube support for scans in Java 11
SonarQube has deprecated support for running scans in a Java 11 runtime environment. It can still scan older Java code, but the scanner must be run in Java 17. Upgrading the the scanner to Java 17 is incompatible with older SonarQube servers. You might need to upgrade your SonarQube server version because of this change. (STO-6970, ZD-57092)
Enhancements
-
You can now configure a Snyk step to show the original score when a Snyk Enterprise security policy overrode the severity of an issue coming from the
snyk
CLI. You can see this information in Issue Details. (STO-7041) -
Implemented back-end changes to improve performance and scalability when processing scan results. (STO-7037)
Fixed issues
-
Fixed a UI issue where the Exemptions page would show the incorrect severity of an issue if that severity was overridden after the original scan. (STO-7069)
-
The SonarQube integration includes better support for orchestrated branch and pull-request scanning with SonarQube Enterprise. (STO-7122, STO-6840, STO-6857, ZD-58021, ZD-55282, ZD-55592)
- Previously, the orchestration scan step downloaded results for the main or master branch regardless of the branch specified in the runtime input or the pull request.
- With this enhancement, the orchestration step always downloads results for the scanned branch or pull request.
- When Branch Scan is selected in the Scan Configuration, the step scans the branch or pull request specified in the pipeline execution.
Branch Scan is behind the feature flag STO_SONARQUBE_BRANCHING
. Contact Harness Support to enable this option.
Update on July 2024: SonarQube Branch Scan feature, which was previously available in early access, became generally available GA in Version 1.102.2
January 2024
Version 1.81
Fixed issue
Fixed an issue on Self-Managed Enterprise Edition platforms where approving or rejecting an exemption threw a 500 error. (STO-6958)
Version 1.80.1
Feature enhancements
-
You can now run STO scans with a CI Free license. In a CI Build step, select Add step and then go to Security and Security Tests in the step library. All STO steps are available. The only limits to this functionality are those imposed by the CI Free license. (STO-6824)
-
The Security Tests UI displays a more helpful, accurate message when no issues match the show/hide filters. (STO-6919)
January 11 runner update
Feature enhancements
-
You can now scan .exe and .net files using the OWASP scan step. (STO-6852, ZD-55558)
-
OWASP scans now display the package name and version for all issues. (STO-6725)
Version 1.78
Fixed issue
- Version incompatibility between Harness services resulted in STO pipelines failing on the
git clone
step in some specific cases. The issue was resolved via rollback. (STO-6905, ZD-56022)
December 2023
Version 1.77.1
New enhancement
This release introduces a behavior change when ingesting SARIF data. Previously, issues with a level of Error in SARIF got assigned a severity of Critical in STO. These issues now get assigned a severity of High. (STO-6845, ZD-55359)
Fixed issue
Fixed an issue where the SonarQube step was assigning incorrect values to the Java Binaries setting. (STO-6808)
Version 1.76
New enhancements
-
Added a new setting for Checkmarx scans, which is useful when you want STO to exclude issues detected by Checkmarx but flagged as Not Exploitable. (STO-6712, ZD-53483)
To enable this setting, go to the Checkmarx or Security step and add the following key-value pair under Settings:
hide_not_exploitable
:True
-
The expiration time for an exemption now starts when the exemption is approved. (STO-6604)
Fixed issue
Fixed an issue where only the first run in a SARIF file was being ingested. This occurred when Snyk was configured with the --all-projects
flag. (STO-6832, ZD-55065)
November 2023
Version 1.75.1
New enhancement
- Browser windows and tabs have more descriptive titles to improve navigation across the primary STO windows. (STO-4555)
- STO Overview
- Test Targets
- Exemptions
- STO Getting Started
Version 1.74.1
New features and enhancements
-
You can now ingest container-image scan results from Aqua Security Enterprise. This integration was previously behind the feature flag
STO_STEP_PALETTE_AQUASEC
but is now generally available. (STO-5661, ZD-41491) -
The Exemptions table now shows the pipeline name in the Scope column and not the ID. This keeps the user experience consistent with other areas of the application. (STO-6631)
Fixed issues
-
Fixed an issue that caused the Issue Details pane to show target names from other projects in the same account. (STO-6693)
-
Fixed a back-end API linking issue that could cause rendering/linking issues in the Security Tests tab. (STO-6586)
Version 1.73.1
Early access feature
You can now scan your repositories and other components used in your code with Anchore Enterprise, a scanner that provides visibility into supply chain security risks. This integration was previously behind the feature flag STO_STEP_PALETTE_AQUASEC
but is now generally available. (STO-6382)
Fixed issues
-
Fixed a configuration issue in a back-end service that prevented AIDA from generating remediation steps. (STO-6610)
-
Fixed a UI issue where the module sidebar in the left-side menu would scroll when a user clicked different menus within STO. With this fix, the module sidebar maintains its position when a user clicks different menus. (STO-6219)
-
Fixed a UI issue in the Security Tests tab where the Stage and Step pull-down filters showed the
identifier
fields. These filters now show thename
fields, which are more human-readable. (STO-6629)
Previous releases
Jan-Oct 2023 releases
Jan-Oct 2023 releases
October 2023
Version 1.72.0
New features and enhancements
-
You can now provide feedback about the AIDA-generated remediation step for a selected issue. (STO-6593)
-
The following Early Availability features are now generally available:
-
You can specify a time limit when you request an exemption. (STO-6367, formerly behind feature flag
STO_TIMEBOUND_EXEMPTIONS
)The Exemptions table includes a Time Remaining column that shows when each exemption is scheduled to expire. The table is sorted by this column by default so that soonest-to-expire exemptions are listed first.
-
You can click on a row in the Exemptions table to view details for the issue associated with that exemption. (STO-5056, formerly behind feature flag
STO_EXEMPTION_DETAILS
)For best results in STO, you should specify a baseline for every target. To encourage this, the Exemption Details pane hides details for an issue if there is no baseline detected. To specify the baseline, select Set in Targets.
-
The Security Tests tab includes a set of Security Executions pull-down menus so you can filter the issue lists by Target, Target Type, Step, Stage, and Scanner. (STO-5212, formerly behind feature flag
STO_DROPDOWN_FILTERS
).
-
Fixed issues
-
Updated the UI terminology to better communicate the relationship between issues in the current scan vs. previous scans. (STO-6613)
The Security Test UI now uses the following labels to describe issues found in the current scan that are common to previous scans:
- Common to <target>:<variant> Issues also found in the last scan of the specified variant.
- Common to previous scan
- Issues also found in the last scan (if the scanned target has no baseline), OR
- Issues also found in the last scan of the baseline (if the scanned variant is the baseline).
- Common to previous / baseline scan Issues also found in the both the last scan of the specified variant AND the last scan of the baseline.
-
Fixed a UI issue in Security Tests when all vulnerabilities detected in a scan had exemptions. The tab showed "No Security Issues Found", all issue counts were 0, and no issues appeared in the UI even when the selected filter included exempted issues. (STO-6642)
Version 1.71.1
Early access
- Updated the exemptions page to bubble up soon-to-expire exemptions to the top of the list. Available in the time bound exemption early access feature available behind the STO_TIMEBOUND_EXEMPTIONS flag. Contact Harness Support to enable the feature. (STO-6367)
Fixed issues
- The STO dashboard used a marketplace graph which was not available in hosted environments. A new native graph has been chosen so the Security Issues (Overall) graph will be available on all environments. (STO-6613)
- Updated the icon for a false positive exemption to match the other icons (STO-6555)
Version 1.70.1
New features and enhancements
- Improved the look and feel of the exemptions page, and added information about the severity of the issue associated with exemptions and exemption requests. (STO-6592)
Early access
-
Added support for Matrix pipelines to the pipeline execution results filters
This fixes an issue in a feature behind the Feature Flag
STO_DROPDOWN_FILTERS
. Contact Harness Support to enable the feature. (STO-6405)
Version 1.69.3
Early access
-
This release includes the following UI enhancements for working with exemptions. (STO-6078)
-
You can click on a row in the Exemptions table to view details for the issue associated with that exemption.
-
For best results in STO, you should specify a baseline for every target. To encourage this, the Exemption Details pane hides details for an issue if there is no baseline detected. To specify the baseline, select Set in Targets.
These enhancements are behind the Feature Flag
STO_EXEMPTION_DETAILS
. Contact Harness Support to enable the feature. (STO-5056) -
Fixed issue
- Occurrences page size longer resets on page update. (STO-6472)
September 2023
Version 1.68.0
Fixed issues
-
Fixed the following UI issues in in Security Tests:
-
Users with view access for Security Issues at the Project level, but not the Account level, could not view issue details. (STO-6421)
-
Some scanners such as Gitleaks would appear with the label Unknown Scan Tool rather than the correct product name. (STO-6454, STO-6337)
-
Added an Exclude field to the SonarQube step and removed the Include step. The Exclude field corresponds to the
sonar.exclusions
setting, which you can use to narrow the focus of a SonarQube scan. (STO-6441)
-
Version 1.67.2
New features and enhancements
- In the STO Overview, Today's Snapshot shows new and remediated issue counts if today's issue counts include any newly detected vulnerabilities or new remddiations. (STO-4998)
Fixed issues
-
Fixed an issue with setting up SSL certificates in Checkmarx, which caused Java keytools to fail. Upgrading to JDK-11 fixed the issue. (STO-6512)
-
Implemented fixes to improve scan times for large jobs using Checkmarx, Snyk, and other scanners. (STO-6408, STO-5676, ZD-49328, ZD-41409, ZD-42436, ZD-49383)
August 2023
Version 1.67.1
New features and enhancements
- The target list table in Test Targets is now paginated. You can configure the list to show 10, 20, 50, or 100 targets per page. (STO-4818)
Fixed issues
-
Fixed a pagination issue in the Security Tests page where switching between different pages resulted in a "Failed to get issues" error. The error occurred when switching from a page of issues (such as 21-40) to another issue for which those settings were invalid. (STO-6465)
-
Fixed an issue where the Security Tests page would fail with a 500 internal error if the scan detected no issues. (STO-6437, ZD-49803)
-
Previously, the Black Duck Hub step ran DOCKER scans only by default. With this release, the scanner runs DETECTOR and SIGNATURE scans by default as well. (STO-6447)
You can configure this step with supported command-line arguments. For more information, go to Additional CLI flags in the Black Duck Hub scanner reference.
-
Fixed a UI issue in the Security Tests tag where the clickable severity tiles — introduced in version 1.64.1, described below — had an extra border on the right. (STO-6372)
SonarQube runner update
Fixed issues
This update to the SonarQube runner includes the following fixed issues:
-
Fixed an issue where the SonarQube step would ignore additional path segments in the domain name. If the domain was set to
https://mysonar.com/sonar
, for example, the SonarQube step would ignore the full path and try to communicate withhttps://mysonar.com
. (STO-6442) -
Fixed an issue where the SonarQube step could not override some SonarQube scan CLI parameters specified in the Additional CLI arguments field. (STO-6443)
Version 1.66.1
Fixed issues
-
Fixed a UI issue where the module sidebar in the left-side menu would scroll when a user clicked different menus within STO. With this fix, the module sidebar maintains its position when a user clicks different menus. (STO-6219)
-
Fixed an issue where users could not select multiple projects in the Security Testing Dashboard or any custom dashboards that use STO components. With this fix, you can select multiple projects from a list of checkboxes. (STO-6228)
Version 1.64.1
New features and enhancements
-
Aqua Trivy scans now capture and report on secrets in plain text, in addition to vulnerabilities. (STO-6345)
-
The Account Settings > Subscriptions > Security Testing Orchestration UI has been updated to display scan limits more clearly. The UI now shows scan limits based on the number of subscribed security developers. (STO-6096)
-
You can now click the severity tiles in the Security Tests tab to filter the issues list by severity. (STO-5784)
-
The issue lists in the the Security Tests tab are now paginated. You can configure each list to show 20, 50, or 100 issues per page. This makes the overall page much easier to navigate if the scan results include a lot of issues. (STO-5949, STO-6099)
Early access
-
The Security Tests tab includes a set of pull-down menus so you can filter the issue lists by Target, Target Type, Step, Stage, and Scanner. (STO-5212).
This feature is behind the Feature Flag
STO_DROPDOWN_FILTERS
. Contact Harness Support to enable the feature. (STO-5056)
Fixed issues
- Fixed a UI issue where the Issue Details pane rendered long HTML values as markdown. These values are now correctly rendered as HTML. (STO-6339)