Skip to main content

21 docs tagged with "rules"

Detailed explanation of rule evaluation and JSON logic.

View all tags

age

Image should be less than expected days old.

cve-count

Max allowed violations for a given severity level.

env-blacklist

Image must not contain forbidden environment variables.

fix-available

All vulnerabilities should be fixed if a patch exists.

has-sbom

Image must provide a Software Bill of Materials.

license-blocklist

Image must not include components with licenses from the configured blocklist.

min-score

OpenSSF Scorecard score is above the threshold.

Playbook Customisation

Playbooks allow you to define your own security policies and customize the structure of your reports. While the Default Playbook covers many best practices, you may want to create a custom one tailored to your organization's specific needs.

Rules

Rules are the evaluation heart of RegiS. Each rule defines a specific condition that the analysis results must satisfy, together with a severity level, interpolated messages, and optional parameters.

Rules

This reference lists all built-in rules shipped with RegiS. For a conceptual overview of how rules work, how to override defaults, and how to use rule templates, see Concepts → Rules.

secret-scan

No secrets or credentials should be embedded in the image.