Source files of the container image volkerraschek/gosec
Go to file
CSRBot 11e70bff6a
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
chore(deps): update dependency securego/gosec to v2.18.0
2023-10-10 13:56:06 +02:00
.dockerignore Initial Commit 2022-01-30 22:49:28 +01:00
.drone.yml core(deps): update git.cryptic.systems/volker.raschek/drone-email to 0.1.5 2023-10-02 13:52:46 +02:00
.editorconfig Initial Commit 2022-01-30 22:49:28 +01:00
.gitattributes Initial Commit 2022-01-30 22:49:28 +01:00
.gitignore Initial Commit 2022-01-30 22:49:28 +01:00
.markdownlint.yaml Initial Commit 2022-01-30 22:49:28 +01:00
Dockerfile chore(deps): update docker.io/library/golang docker tag to v1.21.2 2023-10-06 20:36:39 +02:00
LICENSE Initial Commit 2022-01-30 22:49:28 +01:00
Makefile chore(deps): update dependency securego/gosec to v2.18.0 2023-10-10 13:56:06 +02:00
manifest.tmpl fix(ci): migrate to git.cryptic.systems 2023-07-08 18:52:06 +02:00
README.md Initial Commit 2022-01-30 22:49:28 +01:00
renovate.json fix(renovate): exclude updating docker.io/plugins/docker 2023-09-03 16:14:45 +02:00

gosec-docker

Build Status Docker Pulls

This project contains all sources to build the container image docker.io/volkerraschek/gosec. The primary goal of this project is to package the binary gosec as container image to provide the functionally for CI/CD workflows. The source code of the binary can be found in the upstream project of gosec.

drone

Here is an example how to use docker.io/volkerraschek/gosec to scan for vulerabilities.

kind: pipeline
type: kubernetes
name: vulnerability-scan

platform:
  os: linux
  arch: amd64

steps:
- name: gosec
  commands:
  - gosec -v ./...
  image: docker.io/volkerraschek/gosec:latest
  resources:
    limits:
      cpu: 250
      memory: 500M