Sistema de onboarding para cadastro de clientes Pessoa Física e Pessoa Jurídica com autenticação via Keycloak.
This project runs 13 security checks across a multi-stage pipeline:
| Stage | Jobs | Purpose |
|---|---|---|
| Build | Backend, Client, Backoffice | Parallel builds with artifact caching |
| Tests | Domain/API/Integration, Client checks, Backoffice checks | Coverage ≥ 80%, tsc, eslint |
| Security | 10 independent jobs (SAST, SCA, SBOM, DAST, Container, IaC, Secrets) | Run in parallel, no dependencies |
| Category | Tools |
|---|---|
| Build/Test | .NET 10 + coverlet (80% coverage threshold) |
| Frontend | Vinxi (tsc, eslint, build) × 2 projects |
| SAST | Semgrep (custom rules), CodeQL (dataflow analysis) |
| SCA | Trivy (dependency CVEs), Dependabot (weekly updates) |
| SBOM | Syft (source code SPDX + container CycloneDX) |
| DAST | OWASP ZAP (baseline scan against running API) |
| Container | Trivy (image scan), Dockle (CIS Benchmarks) |
| IaC | Checkov (Docker Compose), Kubescape (K8s preparation) |
| Secrets | Gitleaks (pattern detection), TruffleHog (active verification) |
Pipeline stages: Build → Tests (needs build) — Security runs parallel, independent.
See Security Overview for complete documentation. See CI Pipeline Architecture for multi-stage details and security tool rationale.
- Backend: .NET 10, ASP.NET Core Controllers, Entity Framework Core, PostgreSQL
- Frontend: React 19, Vinxi (Vite-based), TypeScript, Tailwind CSS, TanStack Router
- Auth: Keycloak 26.1 (hardened), JWT, ROPC grant
- Infrastructure: Docker Compose, GitHub Actions CI/CD
- Observability: Serilog, OpenTelemetry
# Start infrastructure
docker compose up -d
# Backend
dotnet restore Onboarding.slnx
dotnet run --project src/Onboarding.API
# Frontend Client
cd frontend/client && npm ci && npm run dev
# Frontend Backoffice
cd frontend/backoffice && npm ci && npm run dev- Contributing — Development setup, code quality, security tools
- Security Overview — All security documentation index
- Security Runbook — Alert response procedures
- Branch Protection — CI gating setup
- IaC Policies — Docker Compose + K8s security rules
- Compliance Mapping — OWASP/LGPD/CIS alignment
Internal project — all rights reserved.