Skip to content

馃帹 Design/Research: Consider failing secure jobs when vulnerability findings are found

Problem to solve

Because our Secure jobs pass even when vulnerabilities are found, users may reference the pipeline view, see a green check, and assume they are secure when they are in fact not.

We have received this feedback multiple times that the current behavior is not intuitive. We also have heard the exact opposite feedback that we should continue passing jobs and that users should be required to reference the pipeline security tab.

User experience goal

Behavior more closely aligned with user expectations - that vulnerability findings should equal failing pipelines

Proposal

Conduct user research to (in)validate what end-users' perceptions are.

After researching and if the findings are that users are confused with our current approach, change the default behavior of security scanners to fail when vulnerability findings are found but keeping the allow_failure: true.

  • This use of allow_failure allows us to draw additional visibility to the results of the security job while not blocking the pipeline, which is one of our UX goals in Secure.

Further Details

Specific scenarios to investigate:

Permissions and Security

No change to permissions

Documentation

Availability & Testing

What does success look like, and how can we measure that?

What is the type of buyer?

GitLab Ultimate

Is this a cross-stage feature?

While this discussion is focused on devopssecure there is potential for it to involve other stages; i.e. Category:Code Quality within devopsverify

Links / references

Edited by Camellia X Yang