feat(docker): add support for using external secrets for initialization phase #8197
DryRunSecurity / Sensitive Files Analyzer
succeeded
Jul 4, 2024 in 0s
DryRun Security
Details
Sensitive Files Analyzer Findings: 7 detected
⚠️ Potential Sensitive File docker-jans-all-in-one/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | docker-jans-all-in-one/Dockerfile |
CodeLink | jans/docker-jans-all-in-one/Dockerfile Lines 58 to 64 in 9efcf00 |
⚠️ Potential Sensitive File docker-jans-all-in-one/app/requirements.txt (click for details)
Type | Potential Sensitive File |
Description | It is typical for Django applications to utilize requirements.txt files to manage their dependencies. A change in this file may indicate an addition of a library/dependency which could introduce additional risk to the application either through vulnerable code, expansion of the application's attack surface via additional routes, or malicious code. |
Filename | docker-jans-all-in-one/app/requirements.txt |
CodeLink | jans/docker-jans-all-in-one/app/requirements.txt Lines 6 to 10 in 9efcf00 |
⚠️ Potential Sensitive File docker-jans-auth-server/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | docker-jans-auth-server/Dockerfile |
CodeLink | jans/docker-jans-auth-server/Dockerfile Lines 103 to 109 in 9efcf00 |
⚠️ Potential Sensitive File docker-jans-casa/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | docker-jans-casa/Dockerfile |
CodeLink | jans/docker-jans-casa/Dockerfile Lines 56 to 62 in 9efcf00 |
⚠️ Potential Sensitive File docker-jans-casa/Makefile (click for details)
Type | Potential Sensitive File |
Description | Makefiles tend to influence the behavior of the executing program and can have security consequences if applied incorrectly. For example, having the ability to run commands that could be irreversible such as rm -rf / , changing file permissions, tampering with dependencies, and more. |
Filename | docker-jans-casa/Makefile |
CodeLink | jans/docker-jans-casa/Makefile Lines 1 to 25 in 9efcf00 |
⚠️ Potential Sensitive File docker-jans-certmanager/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | docker-jans-certmanager/Dockerfile |
CodeLink | jans/docker-jans-certmanager/Dockerfile Lines 25 to 31 in 9efcf00 |
⚠️ Potential Sensitive File docker-jans-config-api/Dockerfile (click for details)
Type | Potential Sensitive File |
Description | Dockerfile changes can introduce security issues such as insecure base images, insecure file permissions, untrusted packages, etc. |
Filename | docker-jans-config-api/Dockerfile |
CodeLink | jans/docker-jans-config-api/Dockerfile Lines 78 to 84 in 9efcf00 |
Loading