Source files of the container image volkerraschek/gosec
Go to file
CSRBot d6da0ab219
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
chore(deps): update docker.io/library/golang docker tag to v1.23.3
2024-11-07 08:14:54 +00:00
.dockerignore Initial Commit 2022-01-30 22:49:28 +01:00
.drone.yml chore(deps): update git.cryptic.systems/volker.raschek/markdownlint docker tag to v0.42.0 2024-10-14 19:19:46 +00:00
.editorconfig Initial Commit 2022-01-30 22:49:28 +01:00
.gitattributes Initial Commit 2022-01-30 22:49:28 +01:00
.gitignore Initial Commit 2022-01-30 22:49:28 +01:00
.markdownlint.yaml Initial Commit 2022-01-30 22:49:28 +01:00
Dockerfile chore(deps): update docker.io/library/golang docker tag to v1.23.3 2024-11-07 08:14:54 +00:00
LICENSE Initial Commit 2022-01-30 22:49:28 +01:00
Makefile chore(deps): update dependency securego/gosec to v2.21.4 2024-10-02 07:13:52 +00:00
manifest.tmpl fix: unsupport arm-v7 image 2023-10-25 14:15:17 +02:00
README.md Initial Commit 2022-01-30 22:49:28 +01:00
renovate.json fix(renovate): update config 2024-09-28 13:34:17 +02:00

gosec-docker

Build Status Docker Pulls

This project contains all sources to build the container image docker.io/volkerraschek/gosec. The primary goal of this project is to package the binary gosec as container image to provide the functionally for CI/CD workflows. The source code of the binary can be found in the upstream project of gosec.

drone

Here is an example how to use docker.io/volkerraschek/gosec to scan for vulerabilities.

kind: pipeline
type: kubernetes
name: vulnerability-scan

platform:
  os: linux
  arch: amd64

steps:
- name: gosec
  commands:
  - gosec -v ./...
  image: docker.io/volkerraschek/gosec:latest
  resources:
    limits:
      cpu: 250
      memory: 500M