Secure Code Analysis #403
code-scanning.yml
on: schedule
tfsec
58s
checkov
2m 51s
Matrix: tflint
Annotations
11 errors, 3 warnings, and 1 notice
tfsec
Code Scanning could not process the submitted SARIF file:
SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file"
|
checkov:
terraform/environments/analytical-platform-compute/vpc.tf#L20
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/cloudwatch-log-groups.tf#L1
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/modules/transfer-family/user/main.tf#L86
CKV_AWS_23: "Ensure every security groups rule has a description"
|
checkov:
terraform/environments/analytical-platform-ingestion/observability-platform.tf#L1
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/s3-notifications.tf#L1
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/s3-notifications.tf#L16
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/s3.tf#L1
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/s3.tf#L19
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/s3.tf#L37
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
terraform/environments/analytical-platform-ingestion/s3.tf#L55
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
tflint (ubuntu-latest)
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: github/codeql-action/upload-sarif@cdcdbb579706841c47f7063dda365e292e5cad7a. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
tfsec
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: github/codeql-action/upload-sarif@cdcdbb579706841c47f7063dda365e292e5cad7a. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
checkov
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: github/codeql-action/upload-sarif@cdcdbb579706841c47f7063dda365e292e5cad7a. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
GitHub API token
Consider setting a GITHUB_TOKEN to prevent GitHub api rate limits
|