You can run the Docker container with the following command, replacing dir/to/scan
with the actual path to your project directory:
docker run --rm -v /dir/to/scan:/my-dir fluidattacks/cli:latest skims scan /my-dir
As shown in the previous lines, there is no need for a configuration file when running the scan on a directory; the scanner executes all checks on the entire directory by default. Do use a configuration file for more granular control over the scanner, for example:
To apply these settings, bind the configuration file to the Docker command as follows, replacing /dir/to/scan
and /path/to/config.yaml
with the appropriate paths for your scan directory and configuration file:
docker run --rm -v /dir/to/scan:/my-dir -v /path/to/config.yaml:/config.yaml fluidattacks/cli:latest skims scan /config.yaml
Integrating the Fluid Attacks scanner into your CI/CD pipeline enables automated security testing throughout your software development lifecycle (SDLC). Here are examples of how to configure the scanner on popular CI/CD providers.
# .github/workflows/dev.yml
name: Standalone CLI
on: [push, pull_request]
jobs:
machineStandalone:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@f095bcc56b7c2baf48f3ac70d6d6782f4f553222
- uses: docker://docker.io/fluidattacks/cli:latest
name: machineStandalone
with:
args: skims scan /dir/to/scan
# .gitlab-ci.yml
machineStandalone:
image: docker.io/fluidattacks/cli:latest
script:
- skims scan /dir/to/scan
# .travis.yml
services:
- docker
before_install:
- docker pull fluidattacks/cli:latest
- docker run fluidattacks/cli:latest /bin/bash -c "cd /dir/to/scan"
script:
- skims scan .
strict
option in your configuration file. See the configuration documentation for details.file_size_limit
)
in your configuration file.