Skip to content

SPSH-1516: Implemented the removal of OX_ID in KC for lehrer when Ema… #30

SPSH-1516: Implemented the removal of OX_ID in KC for lehrer when Ema…

SPSH-1516: Implemented the removal of OX_ID in KC for lehrer when Ema… #30

Re-run triggered November 28, 2024 13:33
Status Success
Total duration 1m 1s
Artifacts 1
scan_helm  /  Kics Helm Chart Scan
25s
scan_helm / Kics Helm Chart Scan
CodeQL  /  Analyze CodeQL
1m 33s
CodeQL / Analyze CodeQL
Linting  /  Nest Lint
1m 15s
Linting / Nest Lint
Tests and Sonarcloud  /  Tests and Sonarcloud
14m 56s
Tests and Sonarcloud / Tests and Sonarcloud
release_helm  /  release
51s
release_helm / release
Publish image and scan with trivy  /  Publish image
1m 24s
Publish image and scan with trivy / Publish image
Publish image and scan with trivy  /  pre_scan
1s
Publish image and scan with trivy / pre_scan
Publish image and scan with trivy  /  ...  /  Trivy Scan
33s
Publish image and scan with trivy / Trivy scan for uploaded image / Trivy Scan
Fit to window
Zoom out
Zoom in

Annotations

10 warnings
[MEDIUM] Container Running As Root: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running As Root: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running As Root: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running As Root: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Containers should only run as non-root user. This limits the exploitability of security misconfigurations and restricts an attacker's possibilities in case of compromise
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/backend-deployment.yaml#L71
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/backend-deployment.yaml#L24
Check if containers are running with low UID, which might cause conflicts with the host's user table.
[MEDIUM] Container Running With Low UID: charts/dbildungs-iam-server/templates/cronjob.yaml#L20
Check if containers are running with low UID, which might cause conflicts with the host's user table.