Source files of the container image volkerraschek/gosec
Go to file
CSRBot daa136f3e4
All checks were successful
continuous-integration/drone/pr Build is passing
continuous-integration/drone/push Build is passing
chore(deps): update git.cryptic.systems/volker.raschek/markdownlint docker tag to v0.38.0
2023-12-09 14:38:41 +00:00
.dockerignore Initial Commit 2022-01-30 22:49:28 +01:00
.drone.yml chore(deps): update git.cryptic.systems/volker.raschek/markdownlint docker tag to v0.38.0 2023-12-09 14:38:41 +00:00
.editorconfig Initial Commit 2022-01-30 22:49:28 +01:00
.gitattributes Initial Commit 2022-01-30 22:49:28 +01:00
.gitignore Initial Commit 2022-01-30 22:49:28 +01:00
.markdownlint.yaml Initial Commit 2022-01-30 22:49:28 +01:00
Dockerfile chore(deps): update docker.io/library/golang docker tag to v1.21.5 2023-12-05 23:09:03 +00:00
LICENSE Initial Commit 2022-01-30 22:49:28 +01:00
Makefile chore(deps): update dependency securego/gosec to v2.18.2 2023-10-26 14:48:04 +00:00
manifest.tmpl fix: unsupport arm-v7 image 2023-10-25 14:15:17 +02:00
README.md Initial Commit 2022-01-30 22:49:28 +01:00
renovate.json fix: unsupport arm-v7 image 2023-10-25 14:15:17 +02:00

gosec-docker

Build Status Docker Pulls

This project contains all sources to build the container image docker.io/volkerraschek/gosec. The primary goal of this project is to package the binary gosec as container image to provide the functionally for CI/CD workflows. The source code of the binary can be found in the upstream project of gosec.

drone

Here is an example how to use docker.io/volkerraschek/gosec to scan for vulerabilities.

kind: pipeline
type: kubernetes
name: vulnerability-scan

platform:
  os: linux
  arch: amd64

steps:
- name: gosec
  commands:
  - gosec -v ./...
  image: docker.io/volkerraschek/gosec:latest
  resources:
    limits:
      cpu: 250
      memory: 500M