uleska-plugin
by jenkinsci
A Jenkins plugin that integrates the Uleska DevSecOps Platform to automate and orchestrate software security testing within DevOps pipelines.
Jenkins plugin that allows for easy integration with the Uleska DevSecOps Platform, which automates and orchestrates software security testing within your DevOps pipeline.
Primary Use Case
This tool is used by DevOps and security teams to seamlessly trigger and manage security scans as part of Jenkins build pipelines, ensuring up-to-date vulnerability information. It is ideal for organizations leveraging the Uleska platform to embed automated security testing into their CI/CD workflows.
- Integration with Uleska DevSecOps Platform
- Trigger security scans from Jenkins pipelines
- Support for both Freestyle and Pipeline Jenkins projects
- Configuration of multiple Uleska instances
- Ability to block builds on scan failure
- Uses API tokens securely stored in Jenkins credentials
- Supports specifying application and version UUIDs for targeted scans
- Plans for future feature expansion
Installation
- Sign up for a Uleska Platform account at https://www.uleska.com/
- Obtain an API key from the Uleska Platform via API/Swagger after authentication
- Navigate to Jenkins Global Configuration (Home > Manage Jenkins > Configure System)
- Scroll to Uleska Configuration and click New Instance
- Enter required fields: Name, URL (with schema, no path), and API Token Secret (stored in Jenkins credentials)
- Save the Jenkins configuration
Usage
>_ Post-build Action in Freestyle project: Select 'UleskaScanner' from the Add post-build action dropdownTriggers a Uleska security scan after the build completes
>_ Pipeline step example:
step([
$class: 'UleskaScanner',
uleskaInstanceName: 'Live',
applicationId: '00000000-1111-2222-3333-444444444444',
versionId: 'aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee',
toolkitName: 'Uleska Code Scan',
propagateFailure: true
])Runs a Uleska security scan within a Jenkins Pipeline, specifying instance, application, version, and toolkit, with option to fail the build on scan failure
- Integrate the plugin to automatically gate Jenkins pipelines, blocking builds on detected vulnerabilities to enforce security policies.
- Leverage the plugin's API token management with Jenkins credentials to maintain secure authentication and reduce exposure risk.
- Combine Uleska scans with other static and dynamic analysis tools in the pipeline to create a comprehensive security testing suite.
- Use scan results to feed vulnerability dashboards and trigger automated remediation workflows, enhancing DevSecOps maturity.
- Plan for future plugin enhancements to include richer scan result reporting and integration with incident response platforms.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about uleska-plugin. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools
PayloadsAllTheThings
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF

hoppscotch
hoppscotch/hoppscotch
Open source API development ecosystem - https://hoppscotch.io (open-source alternative to Postman, Insomnia)
ImHex
WerWolv/ImHex
🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.

termux-app
termux/termux-app
Termux - a terminal emulator application for Android OS extendible by variety of packages.

sentry
getsentry/sentry
Developer-first error tracking and performance monitoring

CheatSheetSeries
OWASP/CheatSheetSeries
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
