OPSEXP-2916: Add ACS audit component image build #412
Annotations
10 warnings
Run KICS Scan:
java/Dockerfile#L24
A user should be specified in the dockerfile, otherwise the image will run as root
|
Run KICS Scan:
connector/msteams/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
tengine/tika/Dockerfile#L17
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
audit-storage/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
ats/sfs/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
ats/trouter/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
tengine/misc/Dockerfile#L12
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
tengine/pdfrenderer/Dockerfile#L18
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
connector/ms365/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Run KICS Scan:
tengine/libreoffice/Dockerfile#L26
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
|
Loading