Artipacked
pipeleek gh container artipacked
Audit for artipacked misconfiguration (secrets in container images)
Synopsis
Scan for dangerous container build patterns that leak secrets like COPY . /path without .dockerignore
| pipeleek gh container artipacked [flags]
|
Options
| -g, --github string GitHub instance URL
-h, --help help for artipacked
-m, --member Scan repositories the user is member of
--order-by string Order repositories by: stars, forks, updated (default "updated")
-n, --organization string Organization to scan
-o, --owned Scan user owned repositories only
-p, --page int Page number to start fetching repositories from (default 1) (default 1)
--public Scan public repositories only
-r, --repo string Repository to scan (if not set, all repositories will be scanned)
-s, --search string Query string for searching repositories
-t, --token string GitHub API token
|
Options inherited from parent commands
| --color Enable colored log output (auto-disabled when using --logfile) (default true)
--config string Config file path. Example: ~/.config/pipeleek/pipeleek.yaml
--ignore-proxy Ignore HTTP_PROXY environment variable
--json Use JSON as log output format
--log-level string Set log level globally (debug, info, warn, error). Example: --log-level=warn
-l, --logfile string Log output to a file
-v, --verbose Enable debug logging (shortcut for --log-level=debug)
|
SEE ALSO