feature: Add support for Trivy in codacy-cli-v2 #29
Your pull request is up to standards!
Codacy found no issues in your code
Annotations
Check warning on line 3 in .examples/go.mod
codacy-production / Codacy Static Code Analysis
.examples/go.mod#L3
Insecure dependency golang/stdlib@v1.22.3 (CVE-2024-24789: golang: archive/zip: Incorrect handling of certain ZIP files) (update to 1.21.11)
Check failure on line 3 in .examples/go.mod
codacy-production / Codacy Static Code Analysis
.examples/go.mod#L3
Insecure dependency golang/stdlib@v1.22.3 (CVE-2024-24790: golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses) (update to 1.21.11)
Check warning on line 6 in .examples/go.mod
codacy-production / Codacy Static Code Analysis
.examples/go.mod#L6
Insecure dependency golang/github.com/aquasecurity/trivy@v0.49.1 (CVE-2024-35192: Trivy possibly leaks registry credential when scanning images from malicious registries) (update to 0.51.2)
Check failure on line 9 in .examples/go.mod
codacy-production / Codacy Static Code Analysis
.examples/go.mod#L9
Insecure dependency golang/github.com/dexidp/dex@v0.0.0-20200121184102-3b39c6440888 (CVE-2020-26290: Critical security issues in XML encoding in github.com/dexidp/dex) (update to 2.27.0)
Check warning on line 33 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L33
Method InstallTrivy has 79 lines of code (limit is 50)
Check failure on line 33 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L33
Method InstallTrivy has a cyclomatic complexity of 19 (limit is 10)
Check warning on line 38 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L38
Detected file permissions that are set to more than `0600` (user/owner can read and write). Setting file permissions to higher than `0600` is most likely unnecessary and violates the principle of least privilege.
Check warning on line 38 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L38
The application was found setting directory permissions to overly permissive values.
Check warning on line 113 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L113
Method has a cyclomatic complexity of 9 (limit is 7)
Check warning on line 139 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L139
Detected file permissions that are set to more than `0600` (user/owner can read and write). Setting file permissions to higher than `0600` is most likely unnecessary and violates the principle of least privilege.
Check warning on line 139 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L139
The application was found setting file permissions to overly permissive values.
Check warning on line 166 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L166
Detected file permissions that are set to more than `0600` (user/owner can read and write). Setting file permissions to higher than `0600` is most likely unnecessary and violates the principle of least privilege.
Check warning on line 166 in config/trivy-utils.go
codacy-production / Codacy Static Code Analysis
config/trivy-utils.go#L166
The application was found setting file permissions to overly permissive values.
Check warning on line 11 in tools/trivyRunner.go
codacy-production / Codacy Static Code Analysis
tools/trivyRunner.go#L11
Method RunTrivy has a cyclomatic complexity of 10 (limit is 7)
Check failure on line 12 in tools/trivyRunner.go
codacy-production / Codacy Static Code Analysis
tools/trivyRunner.go#L12
Detected non-static command inside Command.
Check failure on line 12 in tools/trivyRunner.go
codacy-production / Codacy Static Code Analysis
tools/trivyRunner.go#L12
OS command injection is a critical vulnerability that can lead to a full system compromise as it may allow an adversary to pass in arbitrary commands or arguments to be executed.
Check notice on line 63 in tools/trivyRunner.go
codacy-production / Codacy Static Code Analysis
tools/trivyRunner.go#L63
func TrivyJsonToSarif should be TrivyJSONToSarif
Check warning on line 105 in tools/trivyRunner.go
codacy-production / Codacy Static Code Analysis
tools/trivyRunner.go#L105
The application was found setting file permissions to overly permissive values.