Skip to content

Merge pull request #2356 from OWASP/renovate/gcp.sdk.version #215

Merge pull request #2356 from OWASP/renovate/gcp.sdk.version

Merge pull request #2356 from OWASP/renovate/gcp.sdk.version #215

Triggered via push December 16, 2025 08:05
Status Success
Total duration 9m 22s
Artifacts 1
build-and-publish
9m 17s
build-and-publish
Fit to window
Zoom out
Zoom in

Annotations

5 warnings
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: Dockerfile#L73
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L19
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "AZURE_KEY_VAULT_ENABLED") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L18
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DOCKER_ENV_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Variables should be defined before their use: Dockerfile#L17
UndefinedVar: Usage of undefined variable '$argBasedVersion' More info: https://docs.docker.com/go/dockerfile/rule/undefined-var/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L16
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "ARG_BASED_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size Digest
OWASP~wrongsecrets~JZSVTP.dockerbuild
253 KB
sha256:e1c7f5691adc50e010586df0d63c0b77628b13bf68a10152ff06ed157da8c562