@@ -205,6 +205,7 @@ func scanImageWithTrivy(image string) (bool, string, error) {
205
205
}
206
206
// Check if vulnerabilities found
207
207
vulns := []string {}
208
+ log .Println ("❗CVEs Found: " )
208
209
if results , ok := result ["Results" ].([]interface {}); ok {
209
210
for _ , r := range results {
210
211
rmap := r .(map [string ]interface {})
@@ -213,7 +214,9 @@ func scanImageWithTrivy(image string) (bool, string, error) {
213
214
vmap := v .(map [string ]interface {})
214
215
severity := vmap ["Severity" ].(string )
215
216
if severity == "HIGH" || severity == "CRITICAL" {
216
- vulns = append (vulns , vmap ["VulnerabilityID" ].(string ))
217
+ msg := fmt .Sprintf (" - 🔥 %s\n " , vmap ["VulnerabilityID" ].(string ))
218
+ //vulns = append(vulns, vmap["VulnerabilityID"].(string))
219
+ vulns = append (vulns , msg )
217
220
}
218
221
}
219
222
}
@@ -262,12 +265,19 @@ func ValidateDeployment(w http.ResponseWriter, r *http.Request) {
262
265
images = append (images , c .Image )
263
266
}
264
267
for _ , image := range images {
265
- log .Printf ("started scanning for [ %s ]" , image )
268
+ log .Println ("────────────────────────────────────────────────────" )
269
+ log .Printf ("🛡️ Deployment Image Scanning Started : %s\n " , image )
270
+ if BYPASS_CVE_DENIED {
271
+ log .Println ("📦 BYPASS_CVE_DENIED: true/yes" )
272
+ } else {
273
+ log .Println ("📦 BYPASS_CVE_DENIED: default(false/no)" )
274
+ }
266
275
ok , vulns , err := scanImageWithTrivy (image )
267
276
if err != nil {
268
277
log .Printf ("Error scanning image %s: %v" , image , err )
269
278
continue
270
279
}
280
+ log .Println ("────────────────────────────────────────────────────" )
271
281
if ! ok {
272
282
denied = true
273
283
reasons = append (reasons , fmt .Sprintf ("%s (CVE: %s)" , image , vulns ))
0 commit comments