-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add image scanning #3614
Add image scanning #3614
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #3614 +/- ##
=======================================
Coverage 95.96% 95.96%
=======================================
Files 683 683
Lines 21912 21912
Branches 2533 2533
=======================================
Hits 21028 21028
Misses 611 611
Partials 273 273 ☔ View full report in Codecov by Sentry. |
25f284d
to
c0ec4a1
Compare
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
c0ec4a1
to
035d201
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
From the log output I'm not yet convinced that it's using the locally downloaded/loaded image 🤔
I see that trivy itself is starting a container and mounting some volumes, so this should be double checked.
@sergei-maertens maybe we should just do the tarball scan:
See: https://github.com/aquasecurity/trivy-action#scanning-a-tarball |
yes, that's the way to go! I'll update the PR I looked into the CodeQL scanning warning too, it's borking on some python syntax so I'm not sure what the proper way to resolve that is, but it's not urgent. |
This should scan the local image rather than downloading it from Docker Hub.
035d201
to
650caa7
Compare
Closes open-formulieren/security-issues#10
Second attempt to add non-intrusive image scanning.