forked from Yelp/detect-secrets
-
Notifications
You must be signed in to change notification settings - Fork 53
Open
Description
Describe the bug
Running the docker image of the tool generates a .secrets.baseline file with an empty result for the secrets.
To reproduce
Steps to reproduce the behavior
- Switch to the directory where you need to run the tool
- Run
detect-secrets scan --update .secrets.baseline --exclude-files="go.sum" - Check the generated
.secrets.baselinejson file. The result property will have some entries.
"results": {
"src/go/stream/stream.go": [
{
"hashed_secret": "524a8fbb68e4f36499a8300890f82558f64cc61d",
"is_verified": false,
"line_number": 76,
"type": "Secret Keyword",
"verified_result": null
}
]
},
"version": "0.13.1+ibm.60.dss",
- Run
docker run -it --rm -v $(pwd):/code icr.io/git-defenders/detect-secrets:redhat-ubi scan --update .secrets.baseline --exclude-files="go.sum" - Check the updated
.secrets.baselinejson file. It will have an empty result property.
"results": {},
"version": "0.13.1+ibm.61.dss",
Impact
High
Additional context:
- Host or local: local
- Operating System: Red Hat Enterprise Linux 8.7 (Ootpa)
- Languages scanned: GoLang
- Repo & build context links: N/A
- Log output: N/A
Metadata
Metadata
Assignees
Labels
No labels

