Skip to content

chore(scan): integrate KICS scanning into PR pipelines #3

chore(scan): integrate KICS scanning into PR pipelines

chore(scan): integrate KICS scanning into PR pipelines #3

Triggered via pull request October 18, 2024 21:29
Status Failure
Total duration 45s
Artifacts

scan-kics.yaml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

1 error and 10 warnings
kics
KICS scan failed with exit code 50
[HIGH] Passwords And Secrets - Generic Password: src/test/e2e/scenarios/resource-data/secret.yaml#L10
Query to find passwords and secrets in infrastructure code.
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/resource-data/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/api-field/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: demo/simple/pod.pass.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/template-validation/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/outputs/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/wait-field/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/multi-resource/podvt1.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: demo/simple/pod.fail.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/multi-resource/podvt2.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process