Skip to content

GitLab CI template for DefectDojo

This project implements a GitLab CI/CD template for DefectDojo dashboard.

DefectDojo is a security program and vulnerability management tool that allows you to consolidate all the vulnerabilities of your project into one source of truth.

⚠ By default, DefectDojo will collect vulnerabilities only on your master or your main branch. For collecting vulnerabilities on another branch, set PROD_REF variable to your branch name.

Please read DefectDojo documentation for further information.

Get started

DefectDojo instance

You must have access to a DefectDojo server and set DEFECTDOJO_SERVER_URL variable according to this server's URL. This server must be configured to allow "Login with GitLab" for the GitLab which hosts your projects.

Login with GitLab, include template and define variables in your project

The initial mandatory step for a developer is to click on "Login with GitLab" button on login page (see dedicated section) in order to retrieve his DefectDojo API v2 key.

All GitLab projects you are developer / maintainer / owner of will be automatically imported into DefectDojo dashboard. The name of the DefectDojo product will be set to the CI_PROJECT_PATH variable of the GitLab project.

Once you have your API v2 key, you may use it :

  • by including the current template in your .gitlab-ci.yml. This is the recommended solution, and the reason why the current template exists (see usage). Don't forget to define DEFECTDOJO variables listed in defectdojo job. If needed, you might also update DEFECTDOJO variables in Global variables.
  • through DefectDojo API, making your own calls to the API

Check you use at least one security tool

DefectDojo job will NOT launch security tools: it will only import security reports that have been generated on YOUR demand in your .gitlab-ci.yml. We strongly advise you to use to be continuous templates to launch security tools. Some security tools are already included in more generic templates (such as python), but other security tools are the object of a specific template (such as sonar).

So make sure that your .gitlab-ci.yml config launches at least one of the supported security tools, otherwise the current template will be useless.

Every day usage in your pipelines

Every time your CI/CD pipeline is launched, if you have at least one security tool which generates a security report, then all of the newly generated security reports will be imported into DefectDojo, you have nothing to do.

You may connect to DefectDojo server to visualize the summary of your project's vulnerabilities. You might also receive an e-mail notification if your project contains new vulnerabilities, depending on the threshold you defined in DEFECTDOJO_NOTIFICATION_SEVERITIES and on the fact you defined DEFECTDOJO_SMTP_SERVER.


This template can be used both as a CI/CD component or using the legacy include:project syntax.

Use as a CI/CD component

Add the following to your gitlab-ci.yml:

  # 1: include the component
  - component:
    # 2: set/override component inputs
      server-url: "" # ⚠ this is only an example

Use as a CI/CD template (legacy)

Add the following to your gitlab-ci.yml:

  # 1: include the template
  - project: "to-be-continuous/defectdojo"
    ref: "2.6.4"
    file: "/templates/gitlab-ci-defectdojo.yml"

  # 2: set/override template variables
  DEFECTDOJO_SERVER_URL: "" # ⚠ this is only an example

defectdojo job

This job uploads security reports found in the artifacts to a DefectDojo server.

It is bound to the .post stage, and uses the following variables:

Input / Variable Description Default value
dir / DEFECTDOJO_DIR DefectDojo working directory .
server-url / DEFECTDOJO_SERVER_URL URL of DefectDojo server none
🔒 DEFECTDOJO_API_KEY Your DefectDojo API v2 Key (see below how to retrieve it) none

Global variables

Depending on the security tools you launch, and their configuration, you may have to redefine some of the following variables in your gitlab-ci.yml:

Input / Variable Description Default value
bandit-reports / DEFECTDOJO_BANDIT_REPORTS path to Bandit JSON reports bandit*.json reports/py-bandit.bandit.json
dc-gradle-reports / DEFECTDOJO_DC_GRADLE_REPORTS path to Dependency Check XML reports (Gradle template) dependency-check*.xml
dc-reports / DEFECTDOJO_DC_REPORTS path to Dependency Check XML reports (Maven template) dependency-check*.xml
gitleaks-reports / DEFECTDOJO_GITLEAKS_REPORTS path to Gitleaks JSON reports gitleaks/gitleaks-report.json reports/gitleaks.native.json
hadolint-reports / DEFECTDOJO_HADOLINT_REPORTS path to Hadolint JSON reports hadolint-json-*.json reports/docker-hadolint-*.native.json
mobsf-reports / DEFECTDOJO_MOBSF_REPORTS path to MobSF JSON reports mobsf*.json
nodejsscan-reports / DEFECTDOJO_NODEJSSCAN_REPORTS path to NodeJSScan SARIF reports nodejsscan-report-sarif.json
npmaudit-reports / DEFECTDOJO_NPMAUDIT_REPORTS path to NPM Audit JSON reports npm-audit*.json
semgrep-reports / DEFECTDOJO_SEMGREP_REPORTS Path to Semgrep reports reports/semgrep.native.json
semgrep-template / SEMGREP_TEMPLATE Path to Semgrep template none
testssl-reports / DEFECTDOJO_TESTSSL_REPORTS path to TestSSL CSV reports reports/testssl.native.csv
zap-reports / DEFECTDOJO_ZAP_REPORTS path to Zap xml reports reports/zap.native.xml
zap-tpl-project / ZAP_TPL_PROJECT path to Zap template (if any) none
trivy-reports / DEFECTDOJO_TRIVY_REPORTS path to Trivy JSON reports trivy/*.json trivy-*.json reports/docker-trivy-*.native.json reports/py-trivy.trivy.json
DEFECTDOJO_SONARQUBE_APPLICATION your application name in Sonar ex: project-name
DEFECTDOJO_SONARQUBE_PROJECT_KEY your project key in Sonar (be careful, the project key might be distinct from project-dir-project-name, sometimes Sonar adds a suffix) ex: project-dir-project-name or project-dir-project-name__AXjLJ76cpGZrj3BUYg10
sonarqube-sinceleakperiod / DEFECTDOJO_SONARQUBE_SINCELEAKPERIOD determines if delta analysis is activated false
sonarqube-nosecurityhotspot / DEFECTDOJO_SONARQUBE_NOSECURITYHOTSPOT if true, disable hotspots processing true
DEFECTDOJO_SONARQUBE_ALLBUGS true if all bugs are returned, false if only vulnerabilities are returned false
base-image / DEFECTDOJO_BASE_IMAGE Alpine base image
smtp-server / DEFECTDOJO_SMTP_SERVER name:port of SMTP server used for notifications none (email notifications disabled)
notification-severities / DEFECTDOJO_NOTIFICATION_SEVERITIES list of (comma separated) severities to be notified on Critical,High
timezone / DEFECTDOJO_TIMEZONE timezone used for naming engagements and setting engagements start and end Europe/Paris
noprod-enabled / DEFECTDOJO_NOPROD_ENABLED determines if defectdojo job is launched on non production branches false

First connection to DefectDojo

Connect to the DefectDojo server and click on "Login with GitLab". You will be redirected to the GitLab login screen. Once logged in, you will be presented with a consent screen where you can accept to share your information with DefectDojo. DefectDojo will then automatically create a DefectDojo Product for each GitLab project in which you have either owner or maintainer role.

⚠ Synchronization between your GitLab projects and your DefectDojo products occurs only each time you "login with GitLab". Therefore, if you have a new GitLab project, or if you leave a GitLab project, you need to login to DefectDojo once again.

Once logged into DefectDojo for the first time, retrieve your API v2 key by clicking on the user logo in the top-right corner. Store this API key into a variable named DEFECTDOJO_API_KEY.

Supported security tools

For now, the current template allows to import reports from the following tools:

  • Bandit
  • Dependency Check
  • Gitleaks
  • Hadolint
  • MobSF
  • NodeJSScan
  • NPM Audit
  • Semgrep
  • SonarQube
  • TestSSL
  • Trivy
  • Zap

SonarQube specific case

SonarQube is specific: contrary to other jobs, sonar job does not generate any artifact, but just launches an analysis on SonarQube server. In defectdojo job, a tool named sonar-report generates an HTML report thanks to Sonar API ; this report is finally imported in DefectDojo.

In order to launch SonarQube HTML-report generation, the following variables must be set:

  • SONAR_URL (used by sonar template)
  • SONAR_TOKEN (used by sonar template)

The following variables are set by default, but may be overriden:


The following command is executed:

sonar-report \
--sonarurl="${SONAR_URL}" \
--branch="${CI_COMMIT_REF_NAME}" \
--sonartoken="${SONAR_TOKEN}" \
--allbugs="${DEFECTDOJO_SONARQUBE_ALLBUGS}" > "$sonar_report"

Manual actions during pipeline

Since some security tools (Bandit, Safety...) must be launched manually in the pipeline, proceed in two steps:

  • click manually on the corresponding jobs
  • when they are all finished, click on defectdojo-publish job to launch it manually

Security considerations

Every DefectDojo admin is authorized to access all data.

The current instance of DefectDojo is deployed on the Zener K8S cluster, so every Zener admin can technically access all data related to DefectDojo.

The data stored in the database is not encrypted at rest. Intra-platform network flows (including flows towards the database) are not encrypted (but external traffic is encrypted). There is no network segmentation.

Version history

See Tags page


The DefectDojo template can be used in conjunction with template variants to cover specific cases.

Vault variant

This variant allows delegating your secrets management to a Vault server.


In order to be able to communicate with the Vault server, the variant requires the additional configuration parameters:

Input / Variable Description Default value
TBC_VAULT_IMAGE The Vault Secrets Provider image to use (can be overridden)
vault-base-url / VAULT_BASE_URL The Vault server base API url none
vault-oidc-aud / VAULT_OIDC_AUD The aud claim for the JWT $CI_SERVER_URL
🔒 VAULT_ROLE_ID The AppRole RoleID must be defined
🔒 VAULT_SECRET_ID The AppRole SecretID must be defined


Then you may retrieve any of your secret(s) from Vault using the following syntax:



Parameter Description
secret_path (path parameter) this is your secret location in the Vault server
field (query parameter) parameter to access a single basic field from the secret JSON payload


  # main template
  - component:
      server-url: "" # ⚠ this is only an example
      # Secrets managed by Vault
      api-key: "@url@http://vault-secrets-provider/api/secrets/b7ecb6ebabc231/defectdojo/credentials?field=token"
  # Vault variant
  - component:
      # audience claim for JWT
      vault-oidc-aud: ""
      vault-base-url: ""