Skip to content

Merge pull request #2351 from OWASP/renovate/terraform-azure #220

Merge pull request #2351 from OWASP/renovate/terraform-azure

Merge pull request #2351 from OWASP/renovate/terraform-azure #220

Triggered via push December 16, 2025 09:38
Status Success
Total duration 7m 3s
Artifacts 1
build-and-publish
6m 59s
build-and-publish
Fit to window
Zoom out
Zoom in

Annotations

5 warnings
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L18
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "DOCKER_ENV_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
Variables should be defined before their use: Dockerfile#L17
UndefinedVar: Usage of undefined variable '$argBasedVersion' More info: https://docs.docker.com/go/dockerfile/rule/undefined-var/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L16
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "ARG_BASED_PASSWORD") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
JSON arguments recommended for ENTRYPOINT/CMD to prevent unintended behavior related to OS signals: Dockerfile#L73
JSONArgsRecommended: JSON arguments recommended for CMD to prevent unintended behavior related to OS signals More info: https://docs.docker.com/go/dockerfile/rule/json-args-recommended/
Sensitive data should not be used in the ARG or ENV commands: Dockerfile#L19
SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "AZURE_KEY_VAULT_ENABLED") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

Artifacts

Produced during runtime
Name Size Digest
OWASP~wrongsecrets~798USG.dockerbuild
172 KB
sha256:57f50eafd9cd623d72b0cc4341fac88f197c047ec05324867f3ef19cb7aa6680