chore(scan): integrate KICS scanning into PR pipelines #4
Annotations
10 warnings
run kics Scan:
src/test/e2e/scenarios/resource-data/secret.yaml#L10
Query to find passwords and secrets in infrastructure code.
|
run kics Scan:
src/test/e2e/scenarios/template-validation/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
run kics Scan:
demo/simple/pod.fail.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
run kics Scan:
demo/simple/pod.pass.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
run kics Scan:
src/test/e2e/scenarios/multi-resource/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
run kics Scan:
src/test/e2e/scenarios/outputs/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
run kics Scan:
src/test/e2e/scenarios/api-field/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
run kics Scan:
src/test/e2e/scenarios/composition-component-definition/pod.pass.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
run kics Scan:
src/test/e2e/scenarios/wait-field/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
run kics Scan:
src/test/e2e/scenarios/pod-label/pod.fail.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
|
Loading