Skip to content

OPSEXP-2121 Add kics scan #4

OPSEXP-2121 Add kics scan

OPSEXP-2121 Add kics scan #4

Triggered via pull request September 25, 2024 13:41
@pmaciuspmacius
synchronize #51
OPSEXP-2121
Status Success
Total duration 28s
Billable time 1m
Artifacts 1

kics.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[HIGH] Missing User Instruction: search/enterprise/common/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
[HIGH] Missing User Instruction: java/Dockerfile#L24
A user should be specified in the dockerfile, otherwise the image will run as root
[MEDIUM] Add Instead of Copy: share/Dockerfile#L14
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L31
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/misc/Dockerfile#L12
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: share/Dockerfile#L13
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: ats/trouter/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: connector/ms365/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: search/enterprise/common/Dockerfile#L7
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.

Artifacts

Produced during runtime
Name Size
kics-report
39.3 KB