Nokogiri dependencies.yml RSA KEY false positive #5773
Closed
wagnerpereira
started this conversation in
False Detection
Replies: 2 comments 1 reply
-
Hello @wagnerpereira Looks like we can't update Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
1 reply
-
I close this discussion. Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
CRITICAL: AWS (aws-secret-access-key)
Description
Trivy start to give this false positive in the last builds in oure pipeline.
/usr/local/bundle/gems/nokogiri-1.15.5/dependencies.yml (secrets)
Total: 1 (CRITICAL: 1)
CRITICAL: AWS (aws-secret-access-key)
════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════════
AWS Secret Access Key
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
/usr/local/bundle/gems/nokogiri-1.15.5/dependencies.yml:36 (added by 'COPY /usr/local/bundle/ /usr/local/bundl')
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
34 # - gpg --verify libiconv-1.17.tar.gz.sig ports/archives/libiconv-1.17.tar.gz
35 # gpg: Signature made Sun 15 May 2022 11:26:42 AM EDT
36 [ # gpg: using RSA key ****************************************
37 # gpg: Good signature from "Bruno Haible (Open Source Development) [email protected]" [unknown]
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
Reproduction Steps
1. Build my image that depends on nokogiri gem 2. Run Trivy on this image 3. Trivy show this false aws-secret-access-key critical error
Target
Container Image
Scanner
Secret
Target OS
debian 12.4
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions