Skip to content

OPSEXP-2121 Add kics scan #5

OPSEXP-2121 Add kics scan

OPSEXP-2121 Add kics scan #5

Triggered via pull request September 25, 2024 13:59
@pmaciuspmacius
synchronize #51
OPSEXP-2121
Status Success
Total duration 27s
Billable time 1m
Artifacts

kics.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[HIGH] Missing User Instruction: search/enterprise/common/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
[HIGH] Missing User Instruction: java/Dockerfile#L24
A user should be specified in the dockerfile, otherwise the image will run as root
[MEDIUM] Add Instead of Copy: tengine/libreoffice/Dockerfile#L26
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/misc/Dockerfile#L12
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: share/Dockerfile#L14
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: share/Dockerfile#L13
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: search/enterprise/common/Dockerfile#L7
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/tika/Dockerfile#L17
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L32
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.