Secure Code Analysis #305
code-scanning.yml
on: schedule
tfsec
29s
checkov
27s
Matrix: tflint
Annotations
11 errors and 1 notice
checkov:
main.tf#L22
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L45
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L74
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
checkov:
main.tf#L100
CKV_TF_1: "Ensure Terraform module sources use a commit hash"
|
tfsec
Code Scanning could not process the submitted SARIF file:
SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file", SARIF URI scheme "git" did not match the checkout URI scheme "file"
|
GitHub API token
Consider setting a GITHUB_TOKEN to prevent GitHub api rate limits
|