Scan with Veracode Container Security
Veracode Container Security scans return vulnerability data and policy evaluations based on several categories of findings.
Before you begin:
To complete this task:
At the command prompt, run this command:
./veracode configure
.When prompted, enter the API ID and secret key you generated in the Veracode Platform.
Run the
scan
command with the appropriate target type, target, and flags. For example:./veracode scan --source alpine:latest --type image
To print the output to a file, add the
-o
flag. You can share this file or save it as an artifact in a pipeline. For example:./veracode scan --source alpine:latest --type image -o alpine-latest.json
Review the results.