Giter Site home page Giter Site logo

local-container-scan's Introduction

local-container-scan

local-container-scan's People

Contributors

shigupt202 avatar

Watchers

 avatar

local-container-scan's Issues

Check run name

image

Is there a way to add container-scan/<image-name> to the check name instead?

Parse logs

image

In case of this, we need to figure out the reason and mount it to the errors section for the action perhaps? Cause if we make it silent/move it to the job (on service side) is there any other way to bring up these details?

Whitelisted vulnerabilities for CIS checks are shown on check run page

Dockle shows all the vulnerabilities in the output logs, even the ones which are whitelisted (The whitelisted vulnerabilities are marked with level "IGNORE"). However, in the code we are simply parsing through all the vulnerabilities without checking the level, and that's why we see the whitelisted vulnerabilities in the check-run description page.
image

Whitelist file path and naming.

It seems that other tools are keeping their configs in root folder under .<toolname> directory.
eg. .circleci, .vscode, .dependabot.

  • We should stick to this convention, i.e. .containerscan in root directory should contain the whitelist file.
  • That said, should we think of a better name or container scan is good to go?

@pingvishal-msft @ammohant - thoughts?

Check run improvements.

  1. Make text in the check run more meaningful. Refer to the comments in pull request #6
  2. Review the texts used

image


  1. Should we display the detailed error in case of failure while scanning, or its right place is only in logs?

image


Make Scan calls Silent

image

This shouldn't show up in logs, right? Given that we don't want to display CVE logs, shouldn't we consider keeping the whole scan as a blackbox in logs?

In Trivy output, there are duplicate CVE's.

I believe Trivy reports vulnerability along with different packages. That's why there are repetitions.

So, if we are not adding packages as a part of check run details, we should filter out the duplicates.
For the logs, we should do the same.

image

Add README.md

Add a README file for explaining the usage and assumptions

Items for next iteration

  1. Currently, the whitelist file is expected at a particular path in the repo with name as whitelist.yaml. This means if the user gives whitelist.yml as the name of the file, it would be ignored.

  2. The action puts the .dockleignore file at the root of the repo. Try to put it in container scan folder and give cwd as an option in ToolRunner.

  3. Output is not set currently.

Fix the empty section in details

image

Either don't print the Common Vulnerabilities section in the details page; or print None found or something similar when there are none found.

Call the section Vulnerabilities instead

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.