Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(critical): add critical severity to KICS CLI #6857

Merged
merged 107 commits into from
Mar 15, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
107 commits
Select commit Hold shift + click to select a range
9691050
feat(critical): add critical severity to KICS CLI and report formats
ArturRibeiro-CX Jan 26, 2024
31e2fac
fix linting summary.go
ArturRibeiro-CX Jan 26, 2024
475178d
add critical severity to post_scan_test and results.json
ArturRibeiro-CX Jan 26, 2024
f9b3601
add critical mapping to all E2E tests
ArturRibeiro-CX Jan 26, 2024
cdd4948
add critical mapping to E2E RESULT 36
ArturRibeiro-CX Jan 26, 2024
d177af4
try to fix linting without nolint
ArturRibeiro-CX Jan 26, 2024
55f25a5
add critical severity to constants, helpers and scan-flags
ArturRibeiro-CX Jan 31, 2024
9747941
critical severity addition to utils.go
ArturRibeiro-CX Jan 31, 2024
308dd23
add CRITICAL to results.json in e2e fixtures
ArturRibeiro-CX Jan 31, 2024
d574dbd
last addition of critical to all files
ArturRibeiro-CX Jan 31, 2024
2c2da76
fix critical severity on scan error
ArturRibeiro-CX Feb 1, 2024
852fee2
fix scan-flags error with critical
ArturRibeiro-CX Feb 1, 2024
0c22ee2
remove critical from scan-flags.json for now
ArturRibeiro-CX Feb 1, 2024
feb5bc5
addition of e2e and tests to kics engine to fix, critical in scan-flag
ArturRibeiro-CX Feb 1, 2024
f9a851f
addition of critical to documentation and scan_help
ArturRibeiro-CX Feb 1, 2024
1a7eb70
adding critical severity to more documentation files
ArturRibeiro-CX Feb 1, 2024
77d40cc
add paths correctly to the E2E_CLI_081_RESULT.json
ArturRibeiro-CX Feb 1, 2024
553057f
fix typo cricital to critical
ArturRibeiro-CX Feb 1, 2024
ff53e5a
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 7, 2024
ea092f0
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Feb 8, 2024
eafe0de
changes to printer test
ArturRibeiro-CX Feb 8, 2024
ccdf321
Merge branch 'master' into critical_add
gabriel-cx Feb 9, 2024
aaa7fa8
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 9, 2024
f472d1e
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 9, 2024
bacca99
add more High results as it was a typo
ArturRibeiro-CX Feb 9, 2024
87f0f0b
added tests for critical in CLI
ArturRibeiro-CX Feb 9, 2024
a74a76c
fix linting, description too long
ArturRibeiro-CX Feb 9, 2024
2407168
exit handler fix
ArturRibeiro-CX Feb 10, 2024
fbbb614
printer_test fix
ArturRibeiro-CX Feb 10, 2024
8deb488
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 16, 2024
24e96dd
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 16, 2024
1b99def
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 19, 2024
3ee1f85
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 19, 2024
54eb919
add e2e test
cxMiguelSilva Feb 21, 2024
56a2086
fix e2e
cxMiguelSilva Feb 21, 2024
accbb26
fix conflicts
cxMiguelSilva Feb 21, 2024
0e6e654
stage e2e
cxMiguelSilva Feb 21, 2024
52b6451
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Feb 21, 2024
3970331
fix merge problems
ArturRibeiro-CX Feb 21, 2024
f9e8849
fix 2e2
cxMiguelSilva Feb 21, 2024
e251348
remove test change
cxMiguelSilva Feb 21, 2024
12ed92e
fix lint
cxMiguelSilva Feb 21, 2024
b9439e2
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Feb 22, 2024
ea9c1c0
Merge branch 'critical_add' into critical-severity-flag
cxMiguelSilva Feb 22, 2024
f7bef74
added critical to e2e's
ArturRibeiro-CX Feb 22, 2024
a3a0f54
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 23, 2024
6fbcca9
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Feb 23, 2024
3743159
Merge branch 'critical_add' of https://github.com/Checkmarx/kics into…
ArturRibeiro-CX Feb 23, 2024
e3ebcac
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 23, 2024
a838ba5
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 26, 2024
1cb0eda
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 26, 2024
1bdd060
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Feb 28, 2024
1d08b12
add critical to new e2e
ArturRibeiro-CX Feb 28, 2024
129ac12
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 28, 2024
fd23982
Merge branch 'master' into critical_add
ArturRibeiro-CX Feb 29, 2024
2e9868d
merge master and fix new e2e
ArturRibeiro-CX Feb 29, 2024
49ce52a
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 1, 2024
1db6f80
marge master
cxMiguelSilva Mar 1, 2024
db1cf44
fix e2e
cxMiguelSilva Mar 1, 2024
8b7cf1d
fix typogi
cxMiguelSilva Mar 1, 2024
1c705b8
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 1, 2024
c91b824
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 1, 2024
f2645e4
add critical to html severityId slice
ArturRibeiro-CX Mar 4, 2024
dbc276c
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 5, 2024
6f5b423
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 5, 2024
5fdb832
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 6, 2024
648d157
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 7, 2024
cc8478e
merge master and fix conflicts
ArturRibeiro-CX Mar 11, 2024
8cbb3a6
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 11, 2024
98b1b58
updater docs to express critical addition
ArturRibeiro-CX Mar 12, 2024
0b5e929
add html report for documentation
ArturRibeiro-CX Mar 12, 2024
514878e
added a new image for pdf and html report
ArturRibeiro-CX Mar 12, 2024
779079c
results docs update with new link image
ArturRibeiro-CX Mar 12, 2024
19caf45
add new linking to html image
ArturRibeiro-CX Mar 12, 2024
6722f31
new image linking
ArturRibeiro-CX Mar 12, 2024
dd47ed3
new image linking fix
ArturRibeiro-CX Mar 12, 2024
4e47da6
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 12, 2024
6a574e9
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Mar 12, 2024
c227824
Merge branch 'critical_add' of https://github.com/Checkmarx/kics into…
ArturRibeiro-CX Mar 12, 2024
aa0522c
new gif for getting started documentation
ArturRibeiro-CX Mar 13, 2024
8841f7a
getting started update with new gif
ArturRibeiro-CX Mar 13, 2024
ac277c6
new images for gitlab integration
ArturRibeiro-CX Mar 13, 2024
80e5291
Merge branch 'master' into critical_add
ArturRibeiro-CX Mar 13, 2024
05ee0d0
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Mar 13, 2024
8bc382c
Merge branch 'critical_add' of https://github.com/Checkmarx/kics into…
ArturRibeiro-CX Mar 13, 2024
fb3d0d2
new image and links
ArturRibeiro-CX Mar 13, 2024
e07ee9f
new linking to the new images
ArturRibeiro-CX Mar 13, 2024
9d35a5f
fix naming
ArturRibeiro-CX Mar 13, 2024
fb443f3
update changes
ArturRibeiro-CX Mar 13, 2024
f2cd57f
new image for kics_gitlab_pipeline_artifact
ArturRibeiro-CX Mar 13, 2024
0c738d5
new image linking
ArturRibeiro-CX Mar 13, 2024
0f82e84
new image for circleci-results doc
ArturRibeiro-CX Mar 13, 2024
567314d
update link for integrations circleci doc
ArturRibeiro-CX Mar 13, 2024
1a5dae2
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Mar 14, 2024
23c6265
better gif quality
ArturRibeiro-CX Mar 14, 2024
2eef044
new link to new gif
ArturRibeiro-CX Mar 14, 2024
fc93fd1
fix vulnerability
JoaoAtGit Mar 14, 2024
11a8100
update new html link
ArturRibeiro-CX Mar 14, 2024
071dc71
Merge branch 'critical_add' of https://github.com/Checkmarx/kics into…
ArturRibeiro-CX Mar 14, 2024
eea70d3
new html link on results docs
ArturRibeiro-CX Mar 14, 2024
c57dfb2
Merge branch 'master' into critical_add
JoaoAtGit Mar 14, 2024
37893b3
Merge branch 'master' of https://github.com/Checkmarx/kics into criti…
ArturRibeiro-CX Mar 14, 2024
7ef3ffb
Merge branch 'critical_add' of github.com:Checkmarx/kics into critica…
JoaoAtGit Mar 14, 2024
9e5010d
fix
JoaoAtGit Mar 14, 2024
4120bbc
Merge pull request #6893 from Checkmarx/critical-severity-flag
asofsilva Mar 14, 2024
0934814
linter
JoaoAtGit Mar 14, 2024
362cd64
fix test
JoaoAtGit Mar 14, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
378 changes: 269 additions & 109 deletions .github/scripts/server-mock/package-lock.json

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@
"descriptionID": "3a7576e5",
"cloudProvider": "aws",
"cwe": ""
}
}
1 change: 1 addition & 0 deletions docs/BADGE.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ For this example, let's assume HIGH and MEDIUM results are bad:

```bash
#!/usr/bin/env bash
CRITICAL=$(jq '.severity_counters.CRITICAL' results.json)
HIGH=$(jq '.severity_counters.HIGH' results.json)
MEDIUM=$(jq '.severity_counters.MEDIUM' results.json)
LOW=$(jq '.severity_counters.LOW' results.json)
Expand Down
2 changes: 1 addition & 1 deletion docs/changes.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@
| ----------- | ------------------------------------------------------------------------------ |
| `timeout` | number of seconds the query has to execute before being canceled (default 60) |
| `profiling` | enables performance profiler that prints resource consumption metrics in the logs during the execution (CPU, MEM) |
| `fail-on` | which kind of results should return an exit code different from 0 accepts: high, medium, low and info example: "high,low" (default [high,medium,low,info]) |
| `fail-on` | which kind of results should return an exit code different from 0 accepts: critical, high, medium, low and info example: "high,low" (default [critical,high,medium,low,info]) |
| `ignore-on-exit` | defines which kind of non-zero exits code should be ignored accepts: all, results, errors, none example: if 'results' is set, only engine errors will make KICS exit code different|

## Updated Flags
Expand Down
5 changes: 3 additions & 2 deletions docs/commands.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ Use "kics [command] --help" for more information about a command.
|-m, --bom |include bill of materials (BoM) in results output|
| --cloud-provider strings | list of cloud providers to scan (alicloud, aws, azure, gcp, nifcloud, tencentcloud)|
| --config string | path to configuration file|
| --new-severities | use new severities in query results |
| --disable-full-descriptions | disable request for full descriptions and use default vulnerability descriptions|
| --disable-secrets | disable secrets scanning|
| --enable-openapi-refs | resolve the file reference, on OpenAPI files (default [false])|
Expand All @@ -48,9 +49,9 @@ Use "kics [command] --help" for more information about a command.
| -e, --exclude-paths strings | exclude paths from scan<br>supports glob and can be provided multiple times or as a quoted comma separated string<br>example: './shouldNotScan/*,somefile.txt'|
| --exclude-queries strings | exclude queries by providing the query ID<br>cannot be provided with query inclusion flags<br>can be provided multiple times or as a comma separated string<br>example: 'e69890e6-fce5-461d-98ad-cb98318dfc96,4728cd65-a20c-49da-8b31-9c08b423e4db'|
| -x, --exclude-results strings | exclude results by providing the similarity ID of a result<br>can be provided multiple times or as a comma separated string<br>example: 'fec62a97d569662093dbb9739360942f...,31263s5696620s93dbb973d9360942fc2a...'|
| --exclude-severities strings | exclude results by providing the severity of a result<br>can be provided multiple times or as a comma separated string<br>example: 'info,low'<br>possible values: 'high, medium, low, info, trace'|
| --exclude-severities strings | exclude results by providing the severity of a result<br>can be provided multiple times or as a comma separated string<br>example: 'info,low'<br>possible values: 'critical, high, medium, low, info, trace'|
| --experimental-queries | include experimental queries (queries not yet thoroughly reviewed) (default [false])|
| --fail-on strings | which kind of results should return an exit code different from 0<br>accepts: high, medium, low and info<br>example: "high,low" (default [high,medium,low,info])|
| --fail-on strings | which kind of results should return an exit code different from 0<br>accepts: critical, high, medium, low and info<br>example: "high,low" (default [critical,high,medium,low,info])|
| -h, --help | help for scan|
| --ignore-on-exit string | defines which kind of non-zero exits code should be ignored<br>accepts: all, results, errors, none<br>example: if 'results' is set, only engine errors will make KICS exit code different from 0 (default "none")|
| -i, --include-queries strings | include queries by providing the query ID<br>cannot be provided with query exclusion flags<br>can be provided multiple times or as a comma separated string<br>example: 'e69890e6-fce5-461d-98ad-cb98318dfc96,4728cd65-a20c-49da-8b31-9c08b423e4db'|
Expand Down
2 changes: 1 addition & 1 deletion docs/creating-queries.md
Original file line number Diff line number Diff line change
Expand Up @@ -225,7 +225,7 @@ go run ./cmd/console/main.go generate-id
```

- `queryName` describes the name of the vulnerability
- `severity` can be filled with `HIGH`, `MEDIUM`, `LOW` or `INFO`
- `severity` can be filled with `CRITICAL`, `HIGH`, `MEDIUM`, `LOW` or `INFO`
- `category` pick one of the following:
- Access Control
- Availability
Expand Down
5 changes: 3 additions & 2 deletions docs/dockerhub.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,7 @@ Flags:
-m, --bom include bill of materials (BoM) in results output
--cloud-provider strings list of cloud providers to scan (alicloud, aws, azure, gcp)
--config string path to configuration file
--new-severities use new severities in query results
--disable-full-descriptions disable request for full descriptions and use default vulnerability descriptions
--disable-secrets disable secrets scanning
--enable-openapi-refs resolve the file reference, on OpenAPI files (default [false])
Expand All @@ -107,8 +108,8 @@ Flags:
example: 'info,low'
--experimental-queries include experimental queries (queries not yet thoroughly reviewed) (default [false])
--fail-on strings which kind of results should return an exit code different from 0
accepts: high, medium, low and info
example: "high,low" (default [high,medium,low,info])
accepts: critical, high, medium, low and info
example: "high,low" (default [critical,high,medium,low,info])
-h, --help help for scan
--ignore-on-exit string defines which kind of non-zero exits code should be ignored
accepts: all, results, errors, none
Expand Down
2 changes: 1 addition & 1 deletion docs/getting-started.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@ docker run -t -v {path_to_host_folder}:/path checkmarx/kics:latest scan -p /path
```

## Scan Example
[![](https://user-images.githubusercontent.com/111127232/206156696-283f9d43-1ff1-4cf4-8fa6-6bf37a282360.gif)](https://user-images.githubusercontent.com/111127232/206156696-283f9d43-1ff1-4cf4-8fa6-6bf37a282360.gif)
[![](https://raw.githubusercontent.com/Checkmarx/kics/23c62655308523e1bf6aa8ae5852848deb263651/docs/img/faster.gif)](https://raw.githubusercontent.com/Checkmarx/kics/23c62655308523e1bf6aa8ae5852848deb263651/docs/img/faster.gif)
Binary file modified docs/img/circleci-results.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/img/faster.gif
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/img/html_report.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/img/kics_gitlab_pipeline_artifact.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/img/kics_gitlab_pipeline_failure.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified docs/img/kics_gitlab_pipeline_success.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed docs/img/pdf-report.png
Binary file not shown.
Binary file added docs/img/pdf_report.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
10 changes: 6 additions & 4 deletions docs/integrations_auto_scanning_visual_studio.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,15 +67,17 @@ Example of results summary:
```hcl
1: CxINFO - 2:04:47 PM]Results summary:
2: Total Results": 141,
3: "HIGH": 10,
4: "INFO": 4,
5: "LOW": 62,
6: "MEDIUM": 65
3: "CRITICAL": 0,
4: "HIGH": 10,
5: "INFO": 4,
6: "LOW": 62,
7: "MEDIUM": 65
```

## Viewing KICS Vulnerability Details
Detailed information about the vulnerabilities that were detected is shown in the file editor window. The vulnerable code is highlighted according the severity level of the vulnerability, as follows:

- Critical - pure red
- High - red
- Medium - orange
- Info - green
Expand Down
2 changes: 1 addition & 1 deletion docs/integrations_circleci.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,4 +44,4 @@ Go to the artifacts tab to inspect the results:

Results will be displayed in plain text:

<img src="https://raw.githubusercontent.com/Checkmarx/kics/master/docs/img/circleci-results.png" width="850">
<img src="https://raw.githubusercontent.com/Checkmarx/kics/0f82e84ccbab376b4606efe5a85432d5b37ecb19/docs/img/circleci-results.png" width="850">
2 changes: 1 addition & 1 deletion docs/integrations_codefresh.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ You can find the KICS Codefresh step [here](https://github.com/Checkmarx/kics-co
| ------------------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------- | ------- | -------- | --------------------------------------------- |
| PROJECT_PATH | terraform/main.tf,Dockerfile | paths to a file or directories to scan, comma separated list | string | Yes | N/A |
| IGNORE\_ON\_EXIT | results | defines which kind of non-zero exits code should be ignored (all, results, errors, none) | string | No | N/A |
| FAIL_ON | high,medium | which kind of results should return an exit code different from 0 | string | No | high,medium,low,info |
| FAIL_ON | high,medium | which kind of results should return an exit code different from 0 | string | No | critical,high,medium,low,info |
| TIME_OUT | 75 | number of seconds the query has to execute before being canceled | string | No | 60 |
| PROFILING | CPU | enables performance profiler that prints resource consumption metrics in the logs during the execution (CPU, MEM) | string | No | N/A |
| TYPES | Ansible,Terraform | case insensitive list of platform types to scan (Ansible, AzureResourceManager, CloudFormation, Dockerfile, Docker Compose, GRPC, GoogleDeploymentManager, Kubernetes, OpenAPI, Terraform) | string | No | All |
Expand Down
6 changes: 3 additions & 3 deletions docs/integrations_gitlabci.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,15 +42,15 @@ When your pipeline executes, it will run this job. If KICS finds any issues, it

#### Pipeline Failure

<img src="https://raw.githubusercontent.com/Checkmarx/kics/master/docs/img/kics_gitlab_pipeline_failure.png" width="850">
<img src="https://raw.githubusercontent.com/Checkmarx/kics/fb3d0d28a14d79040e9368418016788bdd155017/docs/img/kics_gitlab_pipeline_failure.png" width="850">

#### Pipeline Success

<img src="https://raw.githubusercontent.com/Checkmarx/kics/master/docs/img/kics_gitlab_pipeline_success.png" width="850">
<img src="https://raw.githubusercontent.com/Checkmarx/kics/fb3d0d28a14d79040e9368418016788bdd155017/docs/img/kics_gitlab_pipeline_success.png" width="850">

#### Download Artifact

<img src="https://raw.githubusercontent.com/Checkmarx/kics/master/docs/img/kics_gitlab_pipeline_artifact.png" width="850">
<img src="https://raw.githubusercontent.com/Checkmarx/kics/f2cd57f929424ee60765622d8b1a3f784707a58f/docs/img/kics_gitlab_pipeline_artifact.png" width="850">

## Using GitLab SAST Reports

Expand Down
2 changes: 2 additions & 0 deletions docs/integrations_tfcloud.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,8 @@ And Create event hook.
Note: You can choose which kind of severity you wish for KICS to fail on by passing `failOn` as query parameter in the URL. KICS will fail on any result found with that severity and above.

Available Severities are:

- critical
- high
- medium
- low
Expand Down
20 changes: 11 additions & 9 deletions docs/results.md
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,7 @@ JSON reports are sorted by severity (from high to info) and should looks like as
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 10,
"INFO": 0,
"LOW": 0,
Expand Down Expand Up @@ -671,14 +672,14 @@ SonarQube reports, follow [SonarQube Import Format](https://docs.sonarqube.org/l
You can export html report by using `--report-formats "html"`.
HTML reports are sorted by severity (from high to info), the results will have query information, a list of files which vulnerability was found and a code snippet where the problem was detected as you can see in following example:

<img src="https://raw.githubusercontent.com/Checkmarx/kics/master/docs/img/html_report.png" width="850">
<img src="https://raw.githubusercontent.com/Checkmarx/kics/fc93fd1fa4ed3572b0732c787be61d4c82fff2e5/docs/img/html_report.png" width="850">

## PDF

You can export a pdf report by using `--report-formats "pdf"`.
PDF reports are sorted by severity (from high to info), the results will have query information and a list of files alongside the line where the result was found.

<img src="https://raw.githubusercontent.com/Checkmarx/kics/master/docs/img/pdf-report.png" width="850">
<img src="https://raw.githubusercontent.com/Checkmarx/kics/514878ea3fbf98042def0b12cca475062321d36d/docs/img/pdf_report.png" width="850">

## CycloneDX

Expand Down Expand Up @@ -987,13 +988,14 @@ KICS displays the results in CLI. For detailed information, you can use `-v --lo

## Results Status Code

| Code | Description |
| ---- | -------------------------- |
| `0` | No Results were Found |
| `50` | Found any `HIGH` Results |
| `40` | Found any `MEDIUM` Results |
| `30` | Found any `LOW` Results |
| `20` | Found any `INFO` Results |
| Code | Description |
| ---- | ----------------------------|
| `0` | No Results were Found |
| `60` | Found any `CRITICAL` Results|
| `50` | Found any `HIGH` Results |
| `40` | Found any `MEDIUM` Results |
| `30` | Found any `LOW` Results |
| `20` | Found any `INFO` Results |

## Error Status Code

Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_032_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 8,
"INFO": 3,
"LOW": 3,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_033_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 1,
"LOW": 2,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_036_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 6,
"INFO": 3,
"LOW": 2,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_036_RESULT_2.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_068_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 1,
"INFO": 0,
"LOW": 1,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_069_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_070_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 1,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_071_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 1,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_072_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 1,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_073_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_074_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 73,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_075_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_076_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_077_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 2,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_078_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_081_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 1,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_083_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_084_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_085_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 0,
"INFO": 0,
"LOW": 0,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_086_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 6,
"INFO": 2,
"LOW": 3,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_087_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 6,
"INFO": 2,
"LOW": 3,
Expand Down
1 change: 1 addition & 0 deletions e2e/fixtures/E2E_CLI_088_RESULT.json
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"CRITICAL": 0,
"HIGH": 6,
"INFO": 2,
"LOW": 3,
Expand Down
Loading
Loading