Closed tamarleviCm closed 2 months ago
Checkmarx One – Scan Summary & Details – 4edf1ccf-98d4-4f16-ae86-c7f09b0901e1
Policy Name | Rule(s) | Break Build |
---|---|---|
[SAST-ML0] Not allowed NEW Sast vulnerabilities | true |
Severity | Issue | Source File / Package | Checkmarx Insight |
---|---|---|---|
Cleartext_Submission_of_Sensitive_Information | /src/main/java/com/checkmarx/jenkins/tools/ProxyHttpClient.java: 34 | Attack Vector | |
Cleartext_Submission_of_Sensitive_Information | /src/main/java/com/checkmarx/jenkins/tools/ProxyHttpClient.java: 34 | Attack Vector | |
Cleartext_Submission_of_Sensitive_Information | /src/main/java/com/checkmarx/jenkins/tools/ProxyHttpClient.java: 34 | Attack Vector |
Severity | Issue | Source File / Package |
---|---|---|
Unpinned Actions Full Length Commit SHA | /ci.yml: 40 | |
Unpinned Actions Full Length Commit SHA | /manual-tag.yml: 23 | |
Unpinned Actions Full Length Commit SHA | /release.yml: 42 | |
Unpinned Actions Full Length Commit SHA | /release.yml: 53 | |
Unpinned Actions Full Length Commit SHA | /cd.yml: 24 | |
Unpinned Actions Full Length Commit SHA | /cd.yml: 17 | |
Unpinned Actions Full Length Commit SHA | /cd.yml: 55 | |
Unpinned Actions Full Length Commit SHA | /cd.yml: 34 |
when users use an artifact manager like Amazon S3 there is a failure in the summary report reading in this feature, we read the file from the Jenkins website as a rest API and not directly from the location in the Jenkins folder
https://checkmarx.atlassian.net/browse/AST-62770
Testing done
Submitter checklist