Secure Code Analysis #262
code-scanning.yml
on: schedule
tfsec
32s
checkov
32s
Matrix: tflint
Annotations
11 errors and 1 notice
tfsec
Code Scanning could not process the submitted SARIF file:
SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file"
|
checkov:
main.tf#L20
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L43
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L72
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L98
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L98
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L98
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L98
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L98
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L98
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L98
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
GitHub API token
Consider setting a GITHUB_TOKEN to prevent GitHub api rate limits
|