go upgrading #367
Merged
go upgrading #367
DryRunSecurity / Sensitive Files Analyzer
succeeded
May 13, 2024 in 1s
DryRun Security
Details
Sensitive Files Analyzer Findings: 7 detected
⚠️ Potential Sensitive File dockerfiles/agent/container/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | dockerfiles/agent/container/Dockerfile |
CodeLink | kubviz/dockerfiles/agent/container/Dockerfile Lines 1 to 4 in a43ec5f |
⚠️ Potential Sensitive File dockerfiles/agent/git/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | dockerfiles/agent/git/Dockerfile |
CodeLink | kubviz/dockerfiles/agent/git/Dockerfile Lines 1 to 4 in a43ec5f |
⚠️ Potential Sensitive File dockerfiles/agent/kubviz/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | dockerfiles/agent/kubviz/Dockerfile |
CodeLink | kubviz/dockerfiles/agent/kubviz/Dockerfile Lines 1 to 5 in a43ec5f |
⚠️ Potential Sensitive File dockerfiles/client/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | dockerfiles/client/Dockerfile |
CodeLink | kubviz/dockerfiles/client/Dockerfile Lines 1 to 5 in a43ec5f |
⚠️ Potential Sensitive File dockerfiles/migration/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | dockerfiles/migration/Dockerfile |
CodeLink | kubviz/dockerfiles/migration/Dockerfile Lines 1 to 4 in a43ec5f |
⚠️ Potential Sensitive File go.mod (click for details)
Type | Potential Sensitive File |
Description | Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code. |
Filename | go.mod |
CodeLink | Lines 1 to 6 in a43ec5f |
⚠️ Potential Sensitive File go.sum (click for details)
Type | Potential Sensitive File |
Description | Golang applications manage their dependencies through their go.mod and go.sum files. A change in these files may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code. |
Filename | go.sum |
CodeLink | Lines 29 to 37 in a43ec5f |
Loading