Skip to content

OPSEXP-2916: Add ACS audit component image build #412

OPSEXP-2916: Add ACS audit component image build

OPSEXP-2916: Add ACS audit component image build #412

Triggered via pull request November 21, 2024 13:02
Status Success
Total duration 38s
Artifacts

kics.yml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[HIGH] Missing User Instruction: java/Dockerfile#L24
A user should be specified in the dockerfile, otherwise the image will run as root
[MEDIUM] Add Instead of Copy: connector/msteams/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/tika/Dockerfile#L17
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: audit-storage/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: ats/sfs/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: ats/trouter/Dockerfile#L11
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/misc/Dockerfile#L12
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/pdfrenderer/Dockerfile#L18
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: connector/ms365/Dockerfile#L10
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.
[MEDIUM] Add Instead of Copy: tengine/libreoffice/Dockerfile#L26
Using ADD to load external installation scripts could lead to an evil web server leveraging this and loading a malicious script.