[Container] 2020/10/21 11:05:21 Waiting for agent ping
[Container] 2020/10/21 11:05:23 Waiting for DOWNLOAD_SOURCE
[Container] 2020/10/21 11:05:23 Phase is DOWNLOAD_SOURCE
[Container] 2020/10/21 11:05:23 CODEBUILD_SRC_DIR=/codebuild/output/src186571250/src
[Container] 2020/10/21 11:05:23 YAML location is /codebuild/readonly/buildspec.yml
[Container] 2020/10/21 11:05:23 Processing environment variables
[Container] 2020/10/21 11:05:23 Decrypting parameter store environment variables
[Container] 2020/10/21 11:05:24 No runtime version selected in buildspec.
[Container] 2020/10/21 11:05:24 Moving to directory /codebuild/output/src186571250/src
[Container] 2020/10/21 11:05:24 Registering with agent
[Container] 2020/10/21 11:05:24 Phases found in YAML: 1
[Container] 2020/10/21 11:05:24  BUILD: 2 commands
[Container] 2020/10/21 11:05:24 Phase complete: DOWNLOAD_SOURCE State: SUCCEEDED
[Container] 2020/10/21 11:05:24 Phase context status code:  Message:
[Container] 2020/10/21 11:05:24 Entering phase INSTALL
[Container] 2020/10/21 11:05:24 Phase complete: INSTALL State: SUCCEEDED
[Container] 2020/10/21 11:05:24 Phase context status code:  Message:
[Container] 2020/10/21 11:05:24 Entering phase PRE_BUILD
[Container] 2020/10/21 11:05:24 Phase complete: PRE_BUILD State: SUCCEEDED
[Container] 2020/10/21 11:05:24 Phase context status code:  Message:
[Container] 2020/10/21 11:05:24 Entering phase BUILD
[Container] 2020/10/21 11:05:24 Running command docker pull $REPOSITORY
Using default tag: latest
latest: Pulling from amazon/amazon-ecs-sample
72d97abdfae3: Pulling fs layer
9db40311d082: Pulling fs layer
991f1d4df942: Pulling fs layer
9fd8189a392d: Pulling fs layer
9fd8189a392d: Waiting
991f1d4df942: Download complete
9fd8189a392d: Verifying Checksum
9fd8189a392d: Download complete
72d97abdfae3: Download complete
9db40311d082: Verifying Checksum
9db40311d082: Download complete
72d97abdfae3: Pull complete
9db40311d082: Pull complete
991f1d4df942: Pull complete
9fd8189a392d: Pull complete
Digest: sha256:36c7b282abd0186e01419f2e58743e1bf635808231049bbc9d77e59e3a8e4914
Status: Downloaded newer image for amazon/amazon-ecs-sample:latest
docker.io/amazon/amazon-ecs-sample:latest

[Container] 2020/10/21 11:05:32 Running command docker run --rm -v /var/run/docker.sock:/var/run/docker.sock $SCAN_IMAGE_NAME analyze -s $SYSDIG_SECURE_ENDPOINT -k $SYSDIG_SECURE_TOKEN $REPOSITORY
Unable to find image 'sysdiglabs/secure-inline-scan:latest' locally
latest: Pulling from sysdiglabs/secure-inline-scan
9d48c3bd43c5: Pulling fs layer
7f94eaf8af20: Pulling fs layer
9fe9984849c1: Pulling fs layer
3091f1b4f1aa: Pulling fs layer
6ef266ac0949: Pulling fs layer
b2c2c13f4c08: Pulling fs layer
f354b3ae6d74: Pulling fs layer
8f4a6170836f: Pulling fs layer
853fedec02a1: Pulling fs layer
a57a377d7e5d: Pulling fs layer
ac4bc61da695: Pulling fs layer
3918501aa043: Pulling fs layer
e77b4d657909: Pulling fs layer
3091f1b4f1aa: Waiting
6ef266ac0949: Waiting
b2c2c13f4c08: Waiting
853fedec02a1: Waiting
a57a377d7e5d: Waiting
ac4bc61da695: Waiting
3918501aa043: Waiting
e77b4d657909: Waiting
f354b3ae6d74: Waiting
8f4a6170836f: Waiting
9fe9984849c1: Download complete
7f94eaf8af20: Download complete
6ef266ac0949: Verifying Checksum
6ef266ac0949: Download complete
9d48c3bd43c5: Verifying Checksum
9d48c3bd43c5: Download complete
b2c2c13f4c08: Verifying Checksum
b2c2c13f4c08: Download complete
f354b3ae6d74: Verifying Checksum
f354b3ae6d74: Download complete
853fedec02a1: Verifying Checksum
853fedec02a1: Download complete
8f4a6170836f: Verifying Checksum
8f4a6170836f: Download complete
a57a377d7e5d: Verifying Checksum
a57a377d7e5d: Download complete
ac4bc61da695: Verifying Checksum
e77b4d657909: Verifying Checksum
e77b4d657909: Download complete
9d48c3bd43c5: Pull complete
3918501aa043: Verifying Checksum
3918501aa043: Download complete
3091f1b4f1aa: Verifying Checksum
3091f1b4f1aa: Download complete
7f94eaf8af20: Pull complete
9fe9984849c1: Pull complete
3091f1b4f1aa: Pull complete
6ef266ac0949: Pull complete
b2c2c13f4c08: Pull complete
f354b3ae6d74: Pull complete
8f4a6170836f: Pull complete
853fedec02a1: Pull complete
a57a377d7e5d: Pull complete
ac4bc61da695: Pull complete
3918501aa043: Pull complete
e77b4d657909: Pull complete
Digest: sha256:64afc49e9474ad3cc6ac02d5e5ba0cc9e01db06f8188a06626f0410b75dd5732
Status: Downloaded newer image for sysdiglabs/secure-inline-scan:latest
Using temporary path /tmp/sysdig/sysdig-inline-scan-1603278342
Retrieving remote Anchore version from Sysdig Secure APIs
Found Anchore version from Sysdig Secure APIs 0.8.1
Pulling docker.io/anchore/inline-scan:v0.8.1
v0.8.1: Pulling from anchore/inline-scan
77c58f19bd6e: Pulling fs layer
47db82df7f3f: Pulling fs layer
be0d47a718dc: Pulling fs layer
60c746b56e11: Pulling fs layer
64dabba9481a: Pulling fs layer
edae365e3a77: Pulling fs layer
abe81e685372: Pulling fs layer
82c213753892: Pulling fs layer
ef57d2ebc5c4: Pulling fs layer
9dae471388a6: Pulling fs layer
f19741cfdf6e: Pulling fs layer
26759c7fd0b4: Pulling fs layer
c2d8b9c22a76: Pulling fs layer
fd4159472bc1: Pulling fs layer
1672e826cca9: Pulling fs layer
42b1de134aad: Pulling fs layer
64dabba9481a: Waiting
edae365e3a77: Waiting
abe81e685372: Waiting
82c213753892: Waiting
ef57d2ebc5c4: Waiting
9dae471388a6: Waiting
60c746b56e11: Waiting
42b1de134aad: Waiting
f19741cfdf6e: Waiting
fd4159472bc1: Waiting
c2d8b9c22a76: Waiting
26759c7fd0b4: Waiting
1672e826cca9: Waiting
47db82df7f3f: Download complete
60c746b56e11: Verifying Checksum
60c746b56e11: Download complete
64dabba9481a: Verifying Checksum
64dabba9481a: Download complete
be0d47a718dc: Verifying Checksum
be0d47a718dc: Download complete
edae365e3a77: Verifying Checksum
edae365e3a77: Download complete
82c213753892: Verifying Checksum
82c213753892: Download complete
ef57d2ebc5c4: Verifying Checksum
ef57d2ebc5c4: Download complete
77c58f19bd6e: Verifying Checksum
77c58f19bd6e: Download complete
9dae471388a6: Download complete
abe81e685372: Verifying Checksum
abe81e685372: Download complete
c2d8b9c22a76: Verifying Checksum
c2d8b9c22a76: Download complete
fd4159472bc1: Verifying Checksum
fd4159472bc1: Download complete
1672e826cca9: Verifying Checksum
1672e826cca9: Download complete
42b1de134aad: Verifying Checksum
42b1de134aad: Download complete
f19741cfdf6e: Verifying Checksum
f19741cfdf6e: Download complete
77c58f19bd6e: Pull complete
47db82df7f3f: Pull complete
26759c7fd0b4: Verifying Checksum
26759c7fd0b4: Download complete
be0d47a718dc: Pull complete
60c746b56e11: Pull complete
64dabba9481a: Pull complete
edae365e3a77: Pull complete
abe81e685372: Pull complete
82c213753892: Pull complete
ef57d2ebc5c4: Pull complete
9dae471388a6: Pull complete
f19741cfdf6e: Pull complete
26759c7fd0b4: Pull complete
c2d8b9c22a76: Pull complete
fd4159472bc1: Pull complete
1672e826cca9: Pull complete
42b1de134aad: Pull complete
Digest: sha256:1a4ddcd785df3a8f0fa0681ceb1f55811a13888a20c2786a2f869729832b8931
Status: Downloaded newer image for anchore/inline-scan:v0.8.1

Repo name: amazon
Base image name: amazon-ecs-sample
Tag name: amazon-ecs-sample

Image id: 2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a

using full image name: docker.io/amazon/amazon-ecs-sample:latest
Saving amazon-ecs-sample:latest for local analysis
Successfully prepared image archive -- /tmp/sysdig/sysdig-inline-scan-1603278342/amazon-ecs-sample:latest.tar

Analyzing docker.io/amazon/amazon-ecs-sample:latest...
[MainThread] [anchore_engine.configuration.localconfig/validate_config()] [WARN] no webhooks defined in configuration file - notifications will be disabled
[MainThread] [anchore_manager.cli.analyzers/exec()] [INFO] using fulltag=docker.io/amazon/amazon-ecs-sample:latest fulldigest=docker.io/amazon/amazon-ecs-sample@sha256:36c7b282abd0186e01419f2e58743e1bf635808231049bbc9d77e59e3a8e4914
 Analysis complete!

Sending analysis archive to ***/api/scanning/v1
Scan Report -
[
 {
  "sha256:36c7b282abd0186e01419f2e58743e1bf635808231049bbc9d77e59e3a8e4914": {
   "docker.io/amazon/amazon-ecs-sample:latest": [
    {
     "detail": {},
     "last_evaluation": "2020-10-21T11:08:22Z",
     "policyId": "default",
     "status": "fail"
    }
   ]
  }
 }
]
Status is fail
Result Details:
[
 {
  "sha256:36c7b282abd0186e01419f2e58743e1bf635808231049bbc9d77e59e3a8e4914": {
   "docker.io/amazon/amazon-ecs-sample:latest": [
    {
     "detail": {
      "policy": {
       "blacklisted_images": [],
       "comment": "Default Sysdig policy bundle for new customers.",
       "id": "default",
       "mappings": [
        {
         "id": "mapping_1CI5tw3zxNL9b344sSsXBfth3dW",
         "image": {
          "type": "tag",
          "value": "*"
         },
         "name": "default",
         "policy_ids": [
          "default"
         ],
         "registry": "*",
         "repository": "*",
         "whitelist_ids": [
          "global"
         ]
        }
       ],
       "name": "Default Sysdig policy bundle",
       "policies": [
        {
         "comment": "System default policy",
         "id": "default",
         "name": "DefaultPolicy",
         "rules": [
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FlJOnK9qdRSRcTNrfz3IUZXbou",
           "params": [
            {
             "name": "instruction",
             "value": "HEALTHCHECK"
            },
            {
             "name": "check",
             "value": "not_exists"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx2yR2myVxaaXMp5zleEUpKd",
           "params": [
            {
             "name": "instruction",
             "value": "USER"
            },
            {
             "name": "check",
             "value": "not_exists"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "vulnerabilities",
           "id": "rule_1FlKixNbbwnsUx8pJtX5xV8uboG",
           "params": [
            {
             "name": "max_days_since_sync",
             "value": "7"
            }
           ],
           "trigger": "stale_feed_data"
          },
          {
           "action": "STOP",
           "gate": "vulnerabilities",
           "id": "rule_1FlKnkFbIN3fSvl71lHIxBXgh2s",
           "params": [
            {
             "name": "package_type",
             "value": "all"
            },
            {
             "name": "severity_comparison",
             "value": "\u003e="
            },
            {
             "name": "severity",
             "value": "high"
            },
            {
             "name": "fix_available",
             "value": "true"
            }
           ],
           "trigger": "package"
          },
          {
           "action": "WARN",
           "gate": "secret_scans",
           "id": "rule_1Ezo0nDiqv0I1wxZPl4MK0RLEAZ",
           "params": [
            {
             "name": "content_regex_name",
             "value": "['AWS_ACCESS_KEY', 'AWS_SECRET_KEY', 'PRIV_KEY', 'DOCKER_AUTH', 'API_KEY']"
            }
           ],
           "trigger": "content_regex_checks"
          },
          {
           "action": "WARN",
           "gate": "passwd_file",
           "id": "rule_1GB4xfQVikoJt0nKyAeUVJwYZYh",
           "params": [],
           "trigger": "content_not_available"
          },
          {
           "action": "WARN",
           "gate": "files",
           "id": "rule_1GB4xhDsvBbDT96h95bjxtONQS2",
           "params": [],
           "trigger": "suid_or_guid_set"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GB4zh3sQYTEnQpa4EcYl34SZYN",
           "params": [
            {
             "name": "ports",
             "value": "22"
            },
            {
             "name": "type",
             "value": "blacklist"
            }
           ],
           "trigger": "exposed_ports"
          }
         ],
         "version": "1_0"
        },
        {
         "comment": "This policy provides out of the box rules around Dockerfile best practices.\nWe frequently update these policies and if you'd like to modify the policy you should use this as a base template to avoid modifications being overwritten.",
         "id": "dockerfile_best_practices",
         "name": "Default Configuration Policy - Dockerfile Best Practices",
         "rules": [
          {
           "action": "WARN",
           "gate": "vulnerabilities",
           "id": "rule_1FlKixNbbwnsUx8pJtX5xV8pboG",
           "params": [
            {
             "name": "max_days_since_sync",
             "value": "7"
            }
           ],
           "trigger": "stale_feed_data"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx5doYKki82uxNWvrdc1zs8O",
           "params": [
            {
             "name": "instruction",
             "value": "RUN"
            },
            {
             "name": "check",
             "value": "like"
            },
            {
             "name": "value",
             "value": ".*apt-get upgrade.*"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1G7q8iETgn96DM2ol2fa7V25GdI",
           "params": [
            {
             "name": "instruction",
             "value": "RUN"
            },
            {
             "name": "check",
             "value": "like"
            },
            {
             "name": "value",
             "value": ".*yum upgrade.*"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx5Brg2RNEAbOoW0mxTLCNjr",
           "params": [
            {
             "name": "instruction",
             "value": "HEALTHCHECK"
            },
            {
             "name": "check",
             "value": "not_exists"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx9O6XGOnz18bInRu9VPSaej",
           "params": [
            {
             "name": "type",
             "value": "blacklist"
            },
            {
             "name": "users",
             "value": "root"
            }
           ],
           "trigger": "effective_user"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx7op3c4lcSutHSevUDEAFmI",
           "params": [
            {
             "name": "type",
             "value": "blacklist"
            },
            {
             "name": "ports",
             "value": "22"
            }
           ],
           "trigger": "exposed_ports"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx33SpKwPliPFh74GdlojO3b",
           "params": [
            {
             "name": "instruction",
             "value": "LABEL"
            },
            {
             "name": "check",
             "value": "="
            },
            {
             "name": "value",
             "value": "latest"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GCUUvkHJ9qmIRjlLcafaAOTXGa",
           "params": [
            {
             "name": "instruction",
             "value": "ENV"
            },
            {
             "name": "check",
             "value": "like"
            },
            {
             "name": "value",
             "value": ".*(password|PASSWORD|passwd|PASSWD|AWS|secret|SECRET).*"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx2yR2myVxaaXMp5zleEUsKd",
           "params": [
            {
             "name": "instruction",
             "value": "USER"
            },
            {
             "name": "check",
             "value": "not_exists"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx2yR2myVxaaXMp5zleEUsKd",
           "params": [
            {
             "name": "instruction",
             "value": "ADD"
            },
            {
             "name": "check",
             "value": "exists"
            }
           ],
           "trigger": "instruction"
          }
         ],
         "version": "1_0"
        },
        {
         "comment": "This policy interprets NIST 800-190 controls and provides out of the box rules to detect image misconfiguration.\nWe frequently update these policies and if you'd like to modify the policy you should use this as a base template to avoid modifications being overwritten.",
         "id": "nist_800-190",
         "name": "Default Audit Policy - NIST 800-190",
         "rules": [
          {
           "action": "WARN",
           "gate": "vulnerabilities",
           "id": "rule_1FlKixNbbwnsUx8pXtX5xV8pboG",
           "params": [
            {
             "name": "max_days_since_sync",
             "value": "7"
            }
           ],
           "trigger": "stale_feed_data"
          },
          {
           "action": "WARN",
           "gate": "npms",
           "id": "rule_1GCOgC9QQulSxT9lLOcSKFl2STV",
           "params": [],
           "trigger": "unknown_in_feeds"
          },
          {
           "action": "WARN",
           "gate": "vulnerabilities",
           "id": "rule_1GCOg9G4MaGKY8nHvqJ8tQ4ZCIf",
           "params": [
            {
             "name": "package_type",
             "value": "non-os"
            },
            {
             "name": "severity_comparison",
             "value": "\u003e="
            },
            {
             "name": "severity",
             "value": "high"
            }
           ],
           "trigger": "package"
          },
          {
           "action": "WARN",
           "gate": "vulnerabilities",
           "id": "rule_1GCMueaFWaigiXsU2mBjHn4CSc2",
           "params": [
            {
             "name": "package_type",
             "value": "os"
            },
            {
             "name": "severity_comparison",
             "value": "\u003e="
            },
            {
             "name": "severity",
             "value": "high"
            }
           ],
           "trigger": "package"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GCMucV3SGGfEJljBxKH1fLmzOd",
           "params": [
            {
             "name": "instruction",
             "value": "USER"
            },
            {
             "name": "check",
             "value": "not_exists"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GCNbqqMC7iEEr7wsKPiugNhlOc",
           "params": [
            {
             "name": "ports",
             "value": "22"
            },
            {
             "name": "type",
             "value": "blacklist"
            }
           ],
           "trigger": "exposed_ports"
          },
          {
           "action": "WARN",
           "gate": "secret_scans",
           "id": "rule_1GCNbpQw4L5QQ3XSc3Od3amcaAQ",
           "params": [
            {
             "name": "content_regex_name",
             "value": "['AWS_ACCESS_KEY', 'AWS_SECRET_KEY', 'PRIV_KEY', 'DOCKER_AUTH', 'API_KEY']"
            }
           ],
           "trigger": "content_regex_checks"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GCNxYBmHUAs7ApbCP3r2fFkGZI",
           "params": [
            {
             "name": "instruction",
             "value": "ENV"
            },
            {
             "name": "check",
             "value": "like"
            },
            {
             "name": "value",
             "value": ".*(password|PASSWORD|passwd|PASSWD|AWS|secret|SECRET).*"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GCOgAvqdpL7yQ7oF5CzyTuCiMa",
           "params": [
            {
             "name": "instruction",
             "value": "HEALTHCHECK"
            },
            {
             "name": "check",
             "value": "not_exists"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "ruby_gems",
           "id": "rule_1GCOoz0dZJuCUoWGUorE5QJRbbT",
           "params": [],
           "trigger": "not_found_in_feed"
          },
          {
           "action": "WARN",
           "gate": "metadata",
           "id": "rule_1GCUV04MF8xH42qTPsYfS1H0UXa",
           "params": [
            {
             "name": "attribute",
             "value": "like_distro"
            },
            {
             "name": "check",
             "value": "not_in"
            },
            {
             "name": "value",
             "value": "alpine, busybox, centos, ubuntu, debian, fedora, ol"
            }
           ],
           "trigger": "attribute"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GCUUwMjZsOKhH1R0y4Jfis9bAk",
           "params": [
            {
             "name": "instruction",
             "value": "ADD"
            },
            {
             "name": "check",
             "value": "exists"
            }
           ],
           "trigger": "instruction"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GCUV2SJhuwNnhFdZI1BZ45FF5i",
           "params": [
            {
             "name": "users",
             "value": "root"
            },
            {
             "name": "type",
             "value": "blacklist"
            }
           ],
           "trigger": "effective_user"
          },
          {
           "action": "WARN",
           "gate": "files",
           "id": "rule_1GCUUvkHJ9qmIRjlLcafaAOTvGa",
           "params": [],
           "trigger": "suid_or_guid_set"
          }
         ],
         "version": "1_0"
        },
        {
         "comment": "This policy interprets PCI controls and provides out of the box rules to detect image misconfiguration.\nWe frequently update these policies and if you'd like to modify the policy you should use this as a base template to avoid modifications being overwritten.",
         "id": "pci",
         "name": "Default Audit Policy - PCI",
         "rules": [
          {
           "action": "WARN",
           "gate": "vulnerabilities",
           "id": "rule_1FlKixNbbNwnsUx8pXX5xV8pboG",
           "params": [
            {
             "name": "max_days_since_sync",
             "value": "7"
            }
           ],
           "trigger": "stale_feed_data"
          },
          {
           "action": "WARN",
           "gate": "files",
           "id": "rule_1GQfcID4qEqVofO7X131FjMeMyV",
           "params": [
            {
             "name": "regex_name",
             "value": ".*(admin|ADMIN|password|PASSWORD).*"
            }
           ],
           "trigger": "content_regex_match"
          },
          {
           "action": "STOP",
           "gate": "vulnerabilities",
           "id": "rule_1GQg23r1pCuRWIx7vQ5TxRIJ7uS",
           "params": [
            {
             "name": "package_type",
             "value": "all"
            },
            {
             "name": "severity_comparison",
             "value": "\u003e="
            },
            {
             "name": "severity",
             "value": "high"
            },
            {
             "name": "fix_available",
             "value": "true"
            }
           ],
           "trigger": "package"
          },
          {
           "action": "WARN",
           "gate": "secret_scans",
           "id": "rule_1GQgwOAxA3NM1haWLTOiVqfmvsA",
           "params": [
            {
             "name": "content_regex_name",
             "value": "['AWS_ACCESS_KEY', 'AWS_SECRET_KEY', 'PRIV_KEY', 'DOCKER_AUTH', 'API_KEY']"
            }
           ],
           "trigger": "content_regex_checks"
          },
          {
           "action": "WARN",
           "gate": "files",
           "id": "rule_1GQgwIBLieRQXkw6IFn2fEMgjMg",
           "params": [],
           "trigger": "suid_or_guid_set"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1FwAx9O6XGOnz18bInRu9VPSaej",
           "params": [
            {
             "name": "type",
             "value": "blacklist"
            },
            {
             "name": "users",
             "value": "root"
            }
           ],
           "trigger": "effective_user"
          },
          {
           "action": "WARN",
           "gate": "dockerfile",
           "id": "rule_1GQgwJ32rk96G4wRsgbzNYy2vGN",
           "params": [
            {
             "name": "instruction",
             "value": "USER"
            },
            {
             "name": "check",
             "value": "not_exists"
            }
           ],
           "trigger": "instruction"
          }
         ],
         "version": "1_0"
        }
       ],
       "version": "1_0",
       "whitelisted_images": [],
       "whitelists": [
        {
         "comment": "Default exceptions list",
         "id": "global",
         "items": [],
         "name": "Default exceptions list",
         "version": "1_0"
        }
       ]
      },
      "result": {
       "bundle": {
        "blacklisted_images": [],
        "comment": "Default Sysdig policy bundle for new customers.",
        "id": "default",
        "mappings": [
         {
          "id": "mapping_1CI5tw3zxNL9b344sSsXBfth3dW",
          "image": {
           "type": "tag",
           "value": "*"
          },
          "name": "default",
          "policy_ids": [
           "default"
          ],
          "registry": "*",
          "repository": "*",
          "whitelist_ids": [
           "global"
          ]
         }
        ],
        "name": "Default Sysdig policy bundle",
        "policies": [
         {
          "comment": "System default policy",
          "id": "default",
          "name": "DefaultPolicy",
          "rules": [
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FlJOnK9qdRSRcTNrfz3IUZXbou",
            "params": [
             {
              "name": "instruction",
              "value": "HEALTHCHECK"
             },
             {
              "name": "check",
              "value": "not_exists"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx2yR2myVxaaXMp5zleEUpKd",
            "params": [
             {
              "name": "instruction",
              "value": "USER"
             },
             {
              "name": "check",
              "value": "not_exists"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "vulnerabilities",
            "id": "rule_1FlKixNbbwnsUx8pJtX5xV8uboG",
            "params": [
             {
              "name": "max_days_since_sync",
              "value": "7"
             }
            ],
            "trigger": "stale_feed_data"
           },
           {
            "action": "STOP",
            "gate": "vulnerabilities",
            "id": "rule_1FlKnkFbIN3fSvl71lHIxBXgh2s",
            "params": [
             {
              "name": "package_type",
              "value": "all"
             },
             {
              "name": "severity_comparison",
              "value": "\u003e="
             },
             {
              "name": "severity",
              "value": "high"
             },
             {
              "name": "fix_available",
              "value": "true"
             }
            ],
            "trigger": "package"
           },
           {
            "action": "WARN",
            "gate": "secret_scans",
            "id": "rule_1Ezo0nDiqv0I1wxZPl4MK0RLEAZ",
            "params": [
             {
              "name": "content_regex_name",
              "value": "['AWS_ACCESS_KEY', 'AWS_SECRET_KEY', 'PRIV_KEY', 'DOCKER_AUTH', 'API_KEY']"
             }
            ],
            "trigger": "content_regex_checks"
           },
           {
            "action": "WARN",
            "gate": "passwd_file",
            "id": "rule_1GB4xfQVikoJt0nKyAeUVJwYZYh",
            "params": [],
            "trigger": "content_not_available"
           },
           {
            "action": "WARN",
            "gate": "files",
            "id": "rule_1GB4xhDsvBbDT96h95bjxtONQS2",
            "params": [],
            "trigger": "suid_or_guid_set"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GB4zh3sQYTEnQpa4EcYl34SZYN",
            "params": [
             {
              "name": "ports",
              "value": "22"
             },
             {
              "name": "type",
              "value": "blacklist"
             }
            ],
            "trigger": "exposed_ports"
           }
          ],
          "version": "1_0"
         },
         {
          "comment": "This policy provides out of the box rules around Dockerfile best practices.\nWe frequently update these policies and if you'd like to modify the policy you should use this as a base template to avoid modifications being overwritten.",
          "id": "dockerfile_best_practices",
          "name": "Default Configuration Policy - Dockerfile Best Practices",
          "rules": [
           {
            "action": "WARN",
            "gate": "vulnerabilities",
            "id": "rule_1FlKixNbbwnsUx8pJtX5xV8pboG",
            "params": [
             {
              "name": "max_days_since_sync",
              "value": "7"
             }
            ],
            "trigger": "stale_feed_data"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx5doYKki82uxNWvrdc1zs8O",
            "params": [
             {
              "name": "instruction",
              "value": "RUN"
             },
             {
              "name": "check",
              "value": "like"
             },
             {
              "name": "value",
              "value": ".*apt-get upgrade.*"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1G7q8iETgn96DM2ol2fa7V25GdI",
            "params": [
             {
              "name": "instruction",
              "value": "RUN"
             },
             {
              "name": "check",
              "value": "like"
             },
             {
              "name": "value",
              "value": ".*yum upgrade.*"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx5Brg2RNEAbOoW0mxTLCNjr",
            "params": [
             {
              "name": "instruction",
              "value": "HEALTHCHECK"
             },
             {
              "name": "check",
              "value": "not_exists"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx9O6XGOnz18bInRu9VPSaej",
            "params": [
             {
              "name": "type",
              "value": "blacklist"
             },
             {
              "name": "users",
              "value": "root"
             }
            ],
            "trigger": "effective_user"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx7op3c4lcSutHSevUDEAFmI",
            "params": [
             {
              "name": "type",
              "value": "blacklist"
             },
             {
              "name": "ports",
              "value": "22"
             }
            ],
            "trigger": "exposed_ports"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx33SpKwPliPFh74GdlojO3b",
            "params": [
             {
              "name": "instruction",
              "value": "LABEL"
             },
             {
              "name": "check",
              "value": "="
             },
             {
              "name": "value",
              "value": "latest"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GCUUvkHJ9qmIRjlLcafaAOTXGa",
            "params": [
             {
              "name": "instruction",
              "value": "ENV"
             },
             {
              "name": "check",
              "value": "like"
             },
             {
              "name": "value",
              "value": ".*(password|PASSWORD|passwd|PASSWD|AWS|secret|SECRET).*"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx2yR2myVxaaXMp5zleEUsKd",
            "params": [
             {
              "name": "instruction",
              "value": "USER"
             },
             {
              "name": "check",
              "value": "not_exists"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx2yR2myVxaaXMp5zleEUsKd",
            "params": [
             {
              "name": "instruction",
              "value": "ADD"
             },
             {
              "name": "check",
              "value": "exists"
             }
            ],
            "trigger": "instruction"
           }
          ],
          "version": "1_0"
         },
         {
          "comment": "This policy interprets NIST 800-190 controls and provides out of the box rules to detect image misconfiguration.\nWe frequently update these policies and if you'd like to modify the policy you should use this as a base template to avoid modifications being overwritten.",
          "id": "nist_800-190",
          "name": "Default Audit Policy - NIST 800-190",
          "rules": [
           {
            "action": "WARN",
            "gate": "vulnerabilities",
            "id": "rule_1FlKixNbbwnsUx8pXtX5xV8pboG",
            "params": [
             {
              "name": "max_days_since_sync",
              "value": "7"
             }
            ],
            "trigger": "stale_feed_data"
           },
           {
            "action": "WARN",
            "gate": "npms",
            "id": "rule_1GCOgC9QQulSxT9lLOcSKFl2STV",
            "params": [],
            "trigger": "unknown_in_feeds"
           },
           {
            "action": "WARN",
            "gate": "vulnerabilities",
            "id": "rule_1GCOg9G4MaGKY8nHvqJ8tQ4ZCIf",
            "params": [
             {
              "name": "package_type",
              "value": "non-os"
             },
             {
              "name": "severity_comparison",
              "value": "\u003e="
             },
             {
              "name": "severity",
              "value": "high"
             }
            ],
            "trigger": "package"
           },
           {
            "action": "WARN",
            "gate": "vulnerabilities",
            "id": "rule_1GCMueaFWaigiXsU2mBjHn4CSc2",
            "params": [
             {
              "name": "package_type",
              "value": "os"
             },
             {
              "name": "severity_comparison",
              "value": "\u003e="
             },
             {
              "name": "severity",
              "value": "high"
             }
            ],
            "trigger": "package"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GCMucV3SGGfEJljBxKH1fLmzOd",
            "params": [
             {
              "name": "instruction",
              "value": "USER"
             },
             {
              "name": "check",
              "value": "not_exists"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GCNbqqMC7iEEr7wsKPiugNhlOc",
            "params": [
             {
              "name": "ports",
              "value": "22"
             },
             {
              "name": "type",
              "value": "blacklist"
             }
            ],
            "trigger": "exposed_ports"
           },
           {
            "action": "WARN",
            "gate": "secret_scans",
            "id": "rule_1GCNbpQw4L5QQ3XSc3Od3amcaAQ",
            "params": [
             {
              "name": "content_regex_name",
              "value": "['AWS_ACCESS_KEY', 'AWS_SECRET_KEY', 'PRIV_KEY', 'DOCKER_AUTH', 'API_KEY']"
             }
            ],
            "trigger": "content_regex_checks"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GCNxYBmHUAs7ApbCP3r2fFkGZI",
            "params": [
             {
              "name": "instruction",
              "value": "ENV"
             },
             {
              "name": "check",
              "value": "like"
             },
             {
              "name": "value",
              "value": ".*(password|PASSWORD|passwd|PASSWD|AWS|secret|SECRET).*"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GCOgAvqdpL7yQ7oF5CzyTuCiMa",
            "params": [
             {
              "name": "instruction",
              "value": "HEALTHCHECK"
             },
             {
              "name": "check",
              "value": "not_exists"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "ruby_gems",
            "id": "rule_1GCOoz0dZJuCUoWGUorE5QJRbbT",
            "params": [],
            "trigger": "not_found_in_feed"
           },
           {
            "action": "WARN",
            "gate": "metadata",
            "id": "rule_1GCUV04MF8xH42qTPsYfS1H0UXa",
            "params": [
             {
              "name": "attribute",
              "value": "like_distro"
             },
             {
              "name": "check",
              "value": "not_in"
             },
             {
              "name": "value",
              "value": "alpine, busybox, centos, ubuntu, debian, fedora, ol"
             }
            ],
            "trigger": "attribute"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GCUUwMjZsOKhH1R0y4Jfis9bAk",
            "params": [
             {
              "name": "instruction",
              "value": "ADD"
             },
             {
              "name": "check",
              "value": "exists"
             }
            ],
            "trigger": "instruction"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GCUV2SJhuwNnhFdZI1BZ45FF5i",
            "params": [
             {
              "name": "users",
              "value": "root"
             },
             {
              "name": "type",
              "value": "blacklist"
             }
            ],
            "trigger": "effective_user"
           },
           {
            "action": "WARN",
            "gate": "files",
            "id": "rule_1GCUUvkHJ9qmIRjlLcafaAOTvGa",
            "params": [],
            "trigger": "suid_or_guid_set"
           }
          ],
          "version": "1_0"
         },
         {
          "comment": "This policy interprets PCI controls and provides out of the box rules to detect image misconfiguration.\nWe frequently update these policies and if you'd like to modify the policy you should use this as a base template to avoid modifications being overwritten.",
          "id": "pci",
          "name": "Default Audit Policy - PCI",
          "rules": [
           {
            "action": "WARN",
            "gate": "vulnerabilities",
            "id": "rule_1FlKixNbbNwnsUx8pXX5xV8pboG",
            "params": [
             {
              "name": "max_days_since_sync",
              "value": "7"
             }
            ],
            "trigger": "stale_feed_data"
           },
           {
            "action": "WARN",
            "gate": "files",
            "id": "rule_1GQfcID4qEqVofO7X131FjMeMyV",
            "params": [
             {
              "name": "regex_name",
              "value": ".*(admin|ADMIN|password|PASSWORD).*"
             }
            ],
            "trigger": "content_regex_match"
           },
           {
            "action": "STOP",
            "gate": "vulnerabilities",
            "id": "rule_1GQg23r1pCuRWIx7vQ5TxRIJ7uS",
            "params": [
             {
              "name": "package_type",
              "value": "all"
             },
             {
              "name": "severity_comparison",
              "value": "\u003e="
             },
             {
              "name": "severity",
              "value": "high"
             },
             {
              "name": "fix_available",
              "value": "true"
             }
            ],
            "trigger": "package"
           },
           {
            "action": "WARN",
            "gate": "secret_scans",
            "id": "rule_1GQgwOAxA3NM1haWLTOiVqfmvsA",
            "params": [
             {
              "name": "content_regex_name",
              "value": "['AWS_ACCESS_KEY', 'AWS_SECRET_KEY', 'PRIV_KEY', 'DOCKER_AUTH', 'API_KEY']"
             }
            ],
            "trigger": "content_regex_checks"
           },
           {
            "action": "WARN",
            "gate": "files",
            "id": "rule_1GQgwIBLieRQXkw6IFn2fEMgjMg",
            "params": [],
            "trigger": "suid_or_guid_set"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1FwAx9O6XGOnz18bInRu9VPSaej",
            "params": [
             {
              "name": "type",
              "value": "blacklist"
             },
             {
              "name": "users",
              "value": "root"
             }
            ],
            "trigger": "effective_user"
           },
           {
            "action": "WARN",
            "gate": "dockerfile",
            "id": "rule_1GQgwJ32rk96G4wRsgbzNYy2vGN",
            "params": [
             {
              "name": "instruction",
              "value": "USER"
             },
             {
              "name": "check",
              "value": "not_exists"
             }
            ],
            "trigger": "instruction"
           }
          ],
          "version": "1_0"
         }
        ],
        "version": "1_0",
        "whitelisted_images": [],
        "whitelists": [
         {
          "comment": "Default exceptions list",
          "id": "global",
          "items": [],
          "name": "Default exceptions list",
          "version": "1_0"
         }
        ]
       },
       "created_at": 1603278503,
       "evaluation_problems": [],
       "final_action": "stop",
       "final_action_reason": "policy_evaluation",
       "image_digest": "sha256:36c7b282abd0186e01419f2e58743e1bf635808231049bbc9d77e59e3a8e4914",
       "image_id": "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
       "last_modified": 1603278503,
       "matched_blacklisted_images_rule": false,
       "matched_mapping_rule": {
        "id": "mapping_1CI5tw3zxNL9b344sSsXBfth3dW",
        "image": {
         "type": "tag",
         "value": "*"
        },
        "name": "default",
        "policy_ids": [
         "default"
        ],
        "registry": "*",
        "repository": "*",
        "whitelist_ids": [
         "global"
        ]
       },
       "matched_whitelisted_images_rule": false,
       "result": {
        "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a": {
         "result": {
          "final_action": "stop",
          "header": [
           "Image_Id",
           "Repo_Tag",
           "Trigger_Id",
           "Gate",
           "Trigger",
           "Check_Output",
           "Gate_Action",
           "Whitelisted",
           "Policy_Id"
          ],
          "row_count": 34,
          "rows": [
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "41cb7cdf04850e33a11f80c42bf660b3",
            "dockerfile",
            "instruction",
            "Dockerfile directive 'HEALTHCHECK' not found, matching condition 'not_exists' check",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "1571e70ee221127984dcf585a56d4cff",
            "dockerfile",
            "instruction",
            "Dockerfile directive 'USER' not found, matching condition 'not_exists' check",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1490+httpd",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - httpd (fixed in: 2.4.46-1.amzn2)(ALAS-2020-1490 - https://alas.aws.amazon.com/AL2/ALAS-2020-1490.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1490+httpd-filesystem",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - httpd-filesystem (fixed in: 2.4.46-1.amzn2)(ALAS-2020-1490 - https://alas.aws.amazon.com/AL2/ALAS-2020-1490.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1490+httpd-tools",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - httpd-tools (fixed in: 2.4.46-1.amzn2)(ALAS-2020-1490 - https://alas.aws.amazon.com/AL2/ALAS-2020-1490.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1298+libnghttp2",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - libnghttp2 (fixed in: 1.39.2-1.amzn2)(ALAS-2019-1298 - https://alas.aws.amazon.com/AL2/ALAS-2019-1298.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1445+libnghttp2",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - libnghttp2 (fixed in: 1.41.0-1.amzn2)(ALAS-2020-1445 - https://alas.aws.amazon.com/AL2/ALAS-2020-1445.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1466+libxml2",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - libxml2 (fixed in: 2.9.1-6.amzn2.4.1)(ALAS-2020-1466 - https://alas.aws.amazon.com/AL2/ALAS-2020-1466.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1342+mod_http2",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - mod_http2 (fixed in: 1.15.3-2.amzn2)(ALAS-2019-1342 - https://alas.aws.amazon.com/AL2/ALAS-2019-1342.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1493+mod_http2",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - mod_http2 (fixed in: 1.15.14-2.amzn2)(ALAS-2020-1493 - https://alas.aws.amazon.com/AL2/ALAS-2020-1493.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1384+nss",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - nss (fixed in: 3.44.0-7.amzn2)(ALAS-2020-1384 - https://alas.aws.amazon.com/AL2/ALAS-2020-1384.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1384+nss-sysinit",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - nss-sysinit (fixed in: 3.44.0-7.amzn2)(ALAS-2020-1384 - https://alas.aws.amazon.com/AL2/ALAS-2020-1384.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1384+nss-tools",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - nss-tools (fixed in: 3.44.0-7.amzn2)(ALAS-2020-1384 - https://alas.aws.amazon.com/AL2/ALAS-2020-1384.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1406+openssl-libs",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - openssl-libs (fixed in: 1.0.2k-19.amzn2.0.3)(ALAS-2020-1406 - https://alas.aws.amazon.com/AL2/ALAS-2020-1406.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1344+php",
            "vulnerabilities",
            "package",
            "CRITICAL Vulnerability found in os package type (rpm) - php (fixed in: 5.4.16-46.amzn2.0.2)(ALAS-2019-1344 - https://alas.aws.amazon.com/AL2/ALAS-2019-1344.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1344+php-cli",
            "vulnerabilities",
            "package",
            "CRITICAL Vulnerability found in os package type (rpm) - php-cli (fixed in: 5.4.16-46.amzn2.0.2)(ALAS-2019-1344 - https://alas.aws.amazon.com/AL2/ALAS-2019-1344.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1344+php-common",
            "vulnerabilities",
            "package",
            "CRITICAL Vulnerability found in os package type (rpm) - php-common (fixed in: 5.4.16-46.amzn2.0.2)(ALAS-2019-1344 - https://alas.aws.amazon.com/AL2/ALAS-2019-1344.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1230+python",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - python (fixed in: 2.7.16-1.amzn2.0.1)(ALAS-2019-1230 - https://alas.aws.amazon.com/AL2/ALAS-2019-1230.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1258+python",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - python (fixed in: 2.7.16-2.amzn2.0.1)(ALAS-2019-1258 - https://alas.aws.amazon.com/AL2/ALAS-2019-1258.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1230+python-libs",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - python-libs (fixed in: 2.7.16-1.amzn2.0.1)(ALAS-2019-1230 - https://alas.aws.amazon.com/AL2/ALAS-2019-1230.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1258+python-libs",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - python-libs (fixed in: 2.7.16-2.amzn2.0.1)(ALAS-2019-1258 - https://alas.aws.amazon.com/AL2/ALAS-2019-1258.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2020-1394+sqlite",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - sqlite (fixed in: 3.7.17-8.amzn2.1.1)(ALAS-2020-1394 - https://alas.aws.amazon.com/AL2/ALAS-2020-1394.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "ALAS-2019-1239+vim-minimal",
            "vulnerabilities",
            "package",
            "HIGH Vulnerability found in os package type (rpm) - vim-minimal (fixed in: 8.1.1602-1.amzn2)(ALAS-2019-1239 - https://alas.aws.amazon.com/AL2/ALAS-2019-1239.html)",
            "stop",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "639f6f1177735759703e928c14714a59",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/bin/chage. Mode: 0o104755",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "c2e44319ae5b3b040044d8ae116d1c2f",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/bin/gpasswd. Mode: 0o104755",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "698044205a9c4a6d48b7937e66a6bf4f",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/bin/mount. Mode: 0o104755",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "463a9a24225c26f7a5bf3f38908e5cb3",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/bin/newgrp. Mode: 0o104755",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "320a97c6816565eedf3545833df99dd0",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/bin/su. Mode: 0o104755",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "e7573262736ef52353cde3bae2617782",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/bin/umount. Mode: 0o104755",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "addbb93c22e9b0988b8b40392a4538cb",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/bin/write. Mode: 0o102755",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "3456a263793066e9b5063ada6e47917d",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/libexec/dbus-1/dbus-daemon-launch-helper. Mode: 0o104750",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "3e5fad1c039f3ecfd1dcdc94d2f1f9a0",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/libexec/utempter/utempter. Mode: 0o102711",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "abb121e9621abdd452f65844954cf1c1",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/sbin/pam_timestamp_check. Mode: 0o104755",
            "warn",
            false,
            "default"
           ],
           [
            "2d0c3b6b1a9b0f6a8bfc156261056589416ca50279e058cea8d184647fef646a",
            "docker.io/amazon/amazon-ecs-sample:latest",
            "34de21e516c0ca50a96e5386f163f8bf",
            "files",
            "suid_or_guid_set",
            "SUID or SGID found set on file /usr/sbin/unix_chkpwd. Mode: 0o104755",
            "warn",
            false,
            "default"
           ]
          ]
         }
        },
        "policy_data": [],
        "policy_name": "",
        "whitelist_data": [],
        "whitelist_names": []
       },
       "status": "fail",
       "tag": "docker.io/amazon/amazon-ecs-sample:latest",
       "user_id": "tenant_1jBE4X3ct49tqsPKsgB3axgT9Ak"
      }
     },
     "last_evaluation": "2020-10-21T11:08:23Z",
     "policyId": "default",
     "status": "fail"
    }
   ]
  }
 }
]View the full result @ ***/#/scanning/scan-results/docker.io%2Famazon%2Famazon-ecs-sample%3Alatest/sha256:36c7b282abd0186e01419f2e58743e1bf635808231049bbc9d77e59e3a8e4914/summaries
PDF report of the scan results can be generated with -R option.

Cleaning up docker container: 7bb6ad85a9c2161326d6671a4c85839ac6a3e282d2499251e236a5368290984a
Removing temporary folder created /tmp/sysdig/sysdig-inline-scan-1603278342

[Container] 2020/10/21 11:08:29 Command did not exit successfully docker run --rm -v /var/run/docker.sock:/var/run/docker.sock $SCAN_IMAGE_NAME analyze -s $SYSDIG_SECURE_ENDPOINT -k $SYSDIG_SECURE_TOKEN $REPOSITORY exit status 1
[Container] 2020/10/21 11:08:29 Phase complete: BUILD State: FAILED
[Container] 2020/10/21 11:08:29 Phase context status code: COMMAND_EXECUTION_ERROR Message: Error while executing command: docker run --rm -v /var/run/docker.sock:/var/run/docker.sock $SCAN_IMAGE_NAME analyze -s $SYSDIG_SECURE_ENDPOINT -k $SYSDIG_SECURE_TOKEN $REPOSITORY. Reason: exit status 1
[Container] 2020/10/21 11:08:29 Entering phase POST_BUILD