harness - The Modern Software Delivery Platform®
Create
Log in
Home
Feedback
Feature Requests
Log in to your harness - The Modern Software Delivery Platform® account to give feedback
Log In
Boards
Feature Requests
Powered by Canny
Feature Requests
Anonymous
Feature Requests for Harness. Select 'Category' based on the module you are requesting the feature for.
Details
Category
Continuous Delivery & GitOps
Continuous Integration
Feature Flags
Cloud Cost Management
Service Reliability Management
Security Testing Orchestration
Chaos Engineering
Software Engineering Insights
General Platform Requests
Internal Developer Portal
Code Repository
IACM
Continuous Error Tracking
Drone 2.x
Open Source
SSCA
Database DevOps
Uncategorized
Showing
Trending
Sort
Trending
Top
New
Filter
Under Review
Planned
In Progress
This Fiscal Quarter
Next Fiscal Quarter
Long-term
Pending Feedback
Complete
posts in
All Categories
All Categories
Continuous Delivery & GitOps (1,375)
Continuous Integration (294)
Feature Flags (72)
Cloud Cost Management (176)
Service Reliability Management (8)
Security Testing Orchestration (71)
Chaos Engineering (26)
Software Engineering Insights (87)
General Platform Requests (360)
Internal Developer Portal (60)
Code Repository (35)
IACM (14)
Continuous Error Tracking (11)
Drone 2.x (11)
Open Source (30)
SSCA (4)
Database DevOps (6)
Consolidate certs into single k8s secret
Currently Harness creates individual k8s secrets for each cert that is part of the same cert bundle and when the certs bundle has more certs, it results in corresponding number of individual secrets referenced in a single pod which causes init delays. Can we consolidate certs into single k8s secret instead of creating individual secrets?
0
1
Integration of STO with Onspring exemption management tool
Security teams at Enterprise companies standardize on a singular tool like OnSpring for exemption management and if Harness could have that integrated with STO, it would be easier for all exemptions in a centralized place.
0
1
Integrate ORCA with STO for vulnerability scan
Currently Harness STO module does not have option for ORCA integration for vulnerability scan. Raising this enhancement request to support this integration.
6
·
under review
2
Nexus First-Class STO Step with Policy Enforcement
Coming from a customer request, they would like the ability to perform similar policy-based STO enforcement on their NexusIQ scans. They would also like a template-step experience for it as well. https://developer.harness.io/docs/security-testing-orchestration/sto-techref-category/sonarqube-sonar-scanner-reference/#view-sonarqube-code-coverage-results https://help.sonatype.com/en/policy-violation-rest-api.html
1
·
long-term
3
aqua trivy fs support
add support for the aqua trivy fs (file system) scan which scans a code repo/files. https://trivy.dev/v0.51/docs/target/filesystem/
1
·
under review
1
Aqua Security on-prem support
Add aqua security on-prem support, which requires adding auth support for username/password. Confirmed with Aqua Security, our partner, than the on-prem does not support long-lived tokens and just the username and password for auth. Today aqua security native STO step only support SaaS version and auth method as Token.
1
·
under review
1
Integrate Dastardly (DAST )tool in Harness
We would to leverage “Dastardly” DAST tool in Harness. Pls do the needful. Dastardly: https://portswigger.net/burp/dastardly
1
·
under review
2
STO granularity in resource group
Currently STO module isn't listed in the selection of resources within resource group. Although the users have the necessary roles assigned to the view entities within STO, they will need have "all" the resources selected in the resource groups if not they are presented with a 403 forbidden error on the UI. Having granularity to select STO objects will be beneficial.
2
·
in progress
7
Fail the prisma step based on "Vulnerability threshold"
Currently the prisma STO step is marked as success even if "Vulnerability threshold check" result is "failed". We need to ensure that the execution fails if the "Vulnerability Threshold Check" fails.
1
·
in progress
1
Support additional cli flags for Anchore Plugin
I would like to place a bug report for hopefully then next upgrade to the Anchore Plugin. The current plugin is extremely limited, at least as far as I can tell. We would like to have the anchorectl switch -t non-os working so that CVE's shown to our deveopers in Security Tests will only show the application data CVEs that they need to be concerned with. An example from cli might be like the following: anchorectl image add rockylinux:9-ubi | anchorectl image vulnerabilities rockylinux:9-ubi -t non-os The standard command is as follows: "anchorectl image vulnerabilities myimage:latest -t non-os". So this is the image vulnerability scan which is likely different to the add command being used by the plugin. "anchorectl image add myimage" "anchorectl image vulnerabilities myimage -t non-os -o json" To be clear it needs to do both. Add the image then create a report with non-os data converted to Harness acceptable for ingest
2
·
next fiscal quarter
1
Load More
→
Powered by Canny