From 8d2b76b392a0e7f2c47c886b274cc4dae51f0937 Mon Sep 17 00:00:00 2001 From: TomRyan-321 <25472582+TomRyan-321@users.noreply.github.com> Date: Mon, 23 Oct 2023 10:23:01 +1100 Subject: [PATCH] prevent fail on secret --- cs_scanimage.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/cs_scanimage.py b/cs_scanimage.py index 7460c0b..7c707b5 100755 --- a/cs_scanimage.py +++ b/cs_scanimage.py @@ -485,13 +485,13 @@ def main(): if json_report: scan_report.export(json_report) f_vuln_score = int(scan_report.get_alerts_vuln()) - f_secrets = int(scan_report.get_alerts_secrets()) + # f_secrets = int(scan_report.get_alerts_secrets()) f_malware = int(scan_report.get_alerts_malware()) scan_report.get_alerts_misconfig() - if f_secrets == ScanStatusCode.Secrets.value: - log.error("Exiting: Secrets found in container image") - sys.exit(ScanStatusCode.Secrets.value) + # if f_secrets == ScanStatusCode.Secrets.value: + # log.error("Exiting: Secrets found in container image") + # sys.exit(ScanStatusCode.Secrets.value) if f_malware == ScanStatusCode.Malware.value: log.error("Exiting: Malware found in container image") sys.exit(ScanStatusCode.Malware.value)