It’s confusing that the directory /etc/ssl/certs of the image is identified by Black Duck with 5% Match Score to this GitHub repo APlonks/plonkc which has no license.
It brings license risks if a project built with python:3.12-slim as the base image.
Does anyone encounter the same issue, and any idea about how to deal with it?
This is most likely a false positive/irrelevant match from the scanning tool as the files in /etc/certs are most probably coming from the os base image/packages in both cases and the linked repo seems to have committed a root file system.
Any blackbox scanning tool like this will necessarily need manual verification of its results and you’re probably better of getting help for that in that tools channels.
But that says “Maintained by: the Docker Community” and “Where to get help: the Docker Community Slack, Server Fault, Unix & Linux, or Stack Overflow”.