Skip to content

Secure Code Analysis #290

Secure Code Analysis

Secure Code Analysis #290

Triggered via schedule December 8, 2023 01:55
Status Failure
Total duration 41s
Artifacts

code-scanning.yml

on: schedule
Matrix: tflint
Fit to window
Zoom out
Zoom in

Annotations

11 errors and 1 notice
tfsec
Code Scanning could not process the submitted SARIF file: SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file"
checkov: main.tf#L22
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L45
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L74
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
checkov: main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
GitHub API token
Consider setting a GITHUB_TOKEN to prevent GitHub api rate limits