Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docker Scanner: #50

Open
radhi1991 opened this issue Feb 13, 2025 · 0 comments
Open

Docker Scanner: #50

radhi1991 opened this issue Feb 13, 2025 · 0 comments
Labels
enhancement New feature or request

Comments

@radhi1991
Copy link
Collaborator

A Docker scanner for detecting secrets is designed to analyze Docker images and identify sensitive information that might be inadvertently included. Here's a breakdown of how such a scanner typically works:
Image Extraction:
The scanner pulls the Docker image and extracts its layers. Each layer represents a filesystem change, and together they form the complete filesystem of the container.

Layer Analysis:
The scanner examines each layer for files that might contain secrets. This includes configuration files, environment variables, and any other files that might store sensitive data.

Secret Prediction
The scanner uses predefined patterns (regular expressions) and ML model for secret prediction.
Reporting:
Once the scan is complete, then xGG generates report in output folder as csv

@radhi1991 radhi1991 added the enhancement New feature or request label Feb 13, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant