Command Line Options
Display the command line options:
docker run -it --rm quay.io/deepfenceio/deepfence_secret_scanner_ce:2.5.0 --help
or, with a standalone build:
$ ./SecretScanner --help
Configuring SecretScanner
General Configuration
-
--debug bool
: print debug level logs. -
--threads int
: Number of concurrent threads to use during scan (default number of logical CPUs). -
--temp-directory string
: temporary storage for working data (default "/tmp") -
--max-secrets int
: Maximum number of secrets to report from a container image or file system (default 1000). -
--maximum-file-size int
: Maximum file size to process in Kb (default 256). -
-multi-match
: Output multiple matches of same pattern in one file. By default, only one match of a pattern is output for a file for better performance -
-max-multi-match int
: Maximum number of matches of same pattern in one file. This is used only when multi-match option is enabled (default 3)
Scan Containers
--image-name string
: scan this image (name:tag) in the local registry--container-id string
: scan a running container, identified by the provided container ID--container-ns string
: search the provided namespace (not used for Docker runtime)
Scan Filesystems
--local string
: scan the local directory in the SecretScanner docker container. Mount the external (host) directory within the container using-v
--host-mount-path string
: inform SecretScanner of the location in the container where the host filesystem was mounted, such as '/tmp/mnt'. SecretScanner uses this as the root directory when matchingexclude_paths
such as/var/lib
(see below)
Configure Output
SecretScanner can write output as Table and JSON format
-output
: Output format: json or table (default "table")
Configure Scans
Scans can be fine-tuned using settings in config.yaml
:
--config-path string
: directory location ofconfig.yaml
. If not set, SecretScanner will fall back to the local binary directory or the current working directory.
config.yaml
can be used to exclude files and locations from the malware scan:
# SecretScanner Configuration File
blacklisted_strings: [] # skip matches containing any of these strings (case sensitive)
blacklisted_extensions: [ ".jpg", ".jpeg", ".png", ".gif", ".bmp", ".tiff", ".tif", ".psd", ".xcf", ".zip", ".tar.gz", ".ttf", ".lock"]
# need to confirm as windows hides file extensions
blacklisted_paths: ["/var/lib/docker", "/var/lib/containerd", "/bin", "/boot", "/dev", "/lib", "/lib64", "/media", "/proc", "/run", "/sbin", "/usr/lib", "/sys"] # use \ for windows paths
For other settings, refer to the sample config.yaml file