diff --git a/scripts/clean_unused_images.sh b/scripts/clean_unused_images.sh index 7ff4bce30..934b28b74 100644 --- a/scripts/clean_unused_images.sh +++ b/scripts/clean_unused_images.sh @@ -12,6 +12,12 @@ find "$IMAGE_FOLDER" -type f | while IFS= read -r image; do # Extract the filename without the path image_name=$(basename "$image") + # If image file name contains "sponsor", skip it + if [[ "$image_name" == *"sponsor"* ]]; then + echo "Skipping sponsor image: $image_name" + continue + fi + echo "Checking image: $image_name" # Search for the image name using rg and capture the result diff --git a/src/pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md b/src/pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md index ae5cdf5e2..39a601d0c 100644 --- a/src/pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md +++ b/src/pentesting-cloud/azure-security/az-post-exploitation/az-key-vault-post-exploitation.md @@ -7,7 +7,7 @@ For more information about this service check: {{#ref}} -../az-services/keyvault.md +../az-services/az-keyvault.md {{#endref}} ### Microsoft.KeyVault/vaults/secrets/getSecret/action diff --git a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md index d76e7a61d..3681e6ae4 100644 --- a/src/pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md +++ b/src/pentesting-cloud/azure-security/az-privilege-escalation/az-key-vault-privesc.md @@ -7,7 +7,7 @@ For more information about this service check: {{#ref}} -../az-services/keyvault.md +../az-services/az-keyvault.md {{#endref}} ### Microsoft.KeyVault/vaults/write