-
Notifications
You must be signed in to change notification settings - Fork 3
Open
Labels
CIIssue relates with CI workflowIssue relates with CI workflowenhancementNew feature or requestNew feature or requestsecurityPreventing misuse or vulnerabilities in softwarePreventing misuse or vulnerabilities in software
Milestone
Description
Description
So much can happen when we build containers with a set of tools, base images, and permissions embedded in them. Even with the best intentions, security issues arise regularly. They have to be prevented as soon as possible, which is why security checks are already embedded in the CI workflow.
What's not found currently is scanning the container that would run in production. For instance, #39 was created due to a huge security issue that needed to be resolved. In the context of this issue, I'm planning to investigate a container scanning tool called Trivy from Aqua
This step will ensure that critical or high-severity vulnerabilities in the base image or dependencies are detected before deployment.
Tasks
- Add a new docker-scan job in the CI pipeline that:
- Runs Trivy to scan the Docker image built in the docker-check job.
- Configure Trivy to scan for vulnerabilities with high and critical severity.
- Set up the job to run only after the docker-check job completes successfully.
- Ensure the CI workflow fails if vulnerabilities are detected with HIGH or CRITICAL severity.
Metadata
Metadata
Assignees
Labels
CIIssue relates with CI workflowIssue relates with CI workflowenhancementNew feature or requestNew feature or requestsecurityPreventing misuse or vulnerabilities in softwarePreventing misuse or vulnerabilities in software