Skip to content

OPSEXP-2801: Add Search service image build support #29

OPSEXP-2801: Add Search service image build support

OPSEXP-2801: Add Search service image build support #29

Triggered via pull request September 30, 2024 21:46
@alxgomzalxgomz
synchronize #53
OPSEXP-2801
Status Success
Total duration 35s
Billable time 1m
Artifacts

kics.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[HIGH] Missing User Instruction: search/enterprise/common/Dockerfile#L1
A user should be specified in the dockerfile, otherwise the image will run as root
[HIGH] Missing User Instruction: java/Dockerfile#L24
A user should be specified in the dockerfile, otherwise the image will run as root
[MEDIUM] Add Instead of Copy: ats/trouter/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: connector/msteams/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: share/Dockerfile#L14
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L32
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: connector/ms365/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: repository/Dockerfile#L31
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/libreoffice/Dockerfile#L26
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.