# gosec-docker

[![Build Status](https://drone.cryptic.systems/api/badges/volker.raschek/gosec-docker/status.svg)](https://drone.cryptic.systems/volker.raschek/gosec-docker)
[![Docker Pulls](https://img.shields.io/docker/pulls/volkerraschek/gosec)](https://hub.docker.com/r/volkerraschek/gosec)

This project contains all sources to build the container image
`docker.io/volkerraschek/gosec`. The primary goal of this project is to package
the binary `gosec` as container image to provide the functionally for CI/CD
workflows. The source code of the binary can be found in the upstream project of
[gosec](github.com/securego/gosec).

## drone

Here is an example how to use `docker.io/volkerraschek/gosec` to scan for
vulerabilities.

```yaml
kind: pipeline
type: kubernetes
name: vulnerability-scan

platform:
  os: linux
  arch: amd64

steps:
- name: gosec
  commands:
  - gosec -v ./...
  image: docker.io/volkerraschek/gosec:latest
  resources:
    limits:
      cpu: 250
      memory: 500M
```