Skip to content

chore(scan): integrate KICS scanning into PR pipelines #4

chore(scan): integrate KICS scanning into PR pipelines

chore(scan): integrate KICS scanning into PR pipelines #4

Triggered via pull request October 18, 2024 21:33
Status Success
Total duration 50s
Artifacts 1

scan-kics.yaml

on: pull_request
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[HIGH] Passwords And Secrets - Generic Password: src/test/e2e/scenarios/resource-data/secret.yaml#L10
Query to find passwords and secrets in infrastructure code.
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/template-validation/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: demo/simple/pod.fail.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: demo/simple/pod.pass.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/multi-resource/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/outputs/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/api-field/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/composition-component-definition/pod.pass.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/wait-field/pod.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process
[HIGH] Privilege Escalation Allowed: src/test/e2e/scenarios/pod-label/pod.fail.yaml#L12
Containers should not run with allowPrivilegeEscalation in order to prevent them from gaining more privileges than their parent process

Artifacts

Produced during runtime
Name Size
SARIF file Expired
9.4 KB