Scan with Veracode Container Security
Veracode Container Security scans return vulnerability data and policy evaluations based on several categories of findings.
Before you begin:
To complete this task:
At the command prompt, run this command:
When prompted, enter the API ID and secret key you generated in the Veracode Platform.
scancommand with the appropriate target type, target, and flags. For example:
./veracode scan --source alpine:latest --type image
To print the output to a file, add the
-oflag. You can share this file or save it as an artifact in a pipeline. For example:
./veracode scan --source alpine:latest --type image -o alpine-latest.json
Review the results.