namespace: myapp
output:
file_path: ./Fluid-Attacks-Results.csv
format: CSV
working_dir: .
language: EN
The following key is available for the SCA scanner, and it can be used to perform SCA analysis over a repository.
include
(mandatory): Paths to files or directories to analyzeexclude
(optional): Files or directories to exclude from the analysissca:
include:
- relative/path/to/file
- relative/path/to/directory/
# Optional keys
exclude:
- glob(**/test/)
namespace: namespace
working_dir: /test/directory
sca:
include:
- src/main/java/org/test/Test.java
working_dir
, for example:namespace: namespace
working_dir: /test/directory
sca:
include:
- glob(*)
exclude:
- glob(**.java)
- glob(src/**/test*.py)
Below is an example of a highly personalized configuration file:
namespace: my_app
working_dir: ./
commit: e59607b9de3ef4c13d292705fg3da1ff0c67eb38
language: EN
output:
file_path: /fluid-attacks-results.csv
format: CSV
checks:
- F052
sca:
include:
- src/front/package-lock.json
- glob(*)
- glob(**.json)
exclude:
- glob(src/**/test/package.json)
The SCA image also has the option to analyze Docker images. For this, you must use the sbom
key.
This key has the following basic options:
source_type: docker
(mandatory): Specifies a Docker image analysisimage_uri
(mandatory): The unique identifier of the image you want to analyzeimage_config
(optional): Specifies different credentials to use for the analysis, allowing the following options:docker_username
(optional): The username that owns the Docker image in the container registry of your choicedocker_password
(optional): The password or token with read access rights to the image.use_docker_daemon
(optional): When set to true, the scan connects to your Docker daemon to analyze images. This is useful for scanning images stored locally. Please note that this option is only available on Linux systems.image_config
sub-key:aws_region
(optional): AWS region for images hosted on ECRaccess_key_id
, secret_access_key
, session_token
(optional): AWS credentials with read access to the ECR image.Below is an example of a configuration file to analyze a Docker image hosted on GHCR.
language: EN
output:
file_path: /working-dir/fluid-attacks-results.csv
format: CSV
sbom:
source_type: docker
image_uri: docker://ghcr.io/myuser/my-img:latest
image_config:
docker_username: myuser
docker_password: ghp_my_secret_token
language: EN
output:
file_path: /working-dir/fluid-attacks-results.csv
format: CSV
sbom:
source_type: docker
image_uri: alpine:3.17
image_config:
use_docker_daemon: true