- Original base image
- Exploiting a Slightly Peculiar Volume Configuration with SIG-Honk
- Reflections on Trusting Trust
- The best way to write secure and reliable applications!
If you want to follow along with the things we did in the talk, first, git clone this repo. Next, install the following dependencies/tools.
Note for M1/Arm users - This demo should work as-is with one exception, and that is the kubectl binary. Download a kubectl binary for arm64 overtop the current amd64 binary before building the images.
Run the following command to build all the variations of the images:
make build-allScan the base image with all four scanners:
make scan-0-baseShow the results of scanning the base image:
make results-0-baseRepeat these steps for each of the image variants:
make scan-1-osmake results-1-os- Modified /etc/os-releasemake scan-2-pkgmake results-2-pkg- Deleted APK metadatamake scan-3-langmake results-3-lang- Symlinked Language Dependency Filesmake scan-4-binmake results-4-bin- UPX packed binariesmake scan-5-zeromake results-5-zero- Multi-stage build with all techniques combined
Run make and see all the helper commands we used during this research.