-
Notifications
You must be signed in to change notification settings - Fork 1
Wip/scan with trivy #150
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Wip/scan with trivy #150
Conversation
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
|
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
| "node_modules/node-fetch": { | ||
| "version": "1.7.3", | ||
| "resolved": "https://registry.npmjs.org/node-fetch/-/node-fetch-1.7.3.tgz", | ||
| "integrity": "sha512-NhZ4CsKx7cYm2vSrBAr2PvFOe6sWDf0UYLRqA6svUYg7+/TSfVAu49jYC4BvQ4Sms9SZgdqGBgroqfDhJdTyKQ==", | ||
| "license": "MIT", | ||
| "dependencies": { | ||
| "encoding": "^0.1.11", | ||
| "is-stream": "^1.0.1" | ||
| } | ||
| }, |
Check failure
Code scanning / Trivy
node-fetch: exposure of sensitive information to an unauthorized actor High
Installed Version: 1.7.3
Vulnerability CVE-2022-0235
Severity: HIGH
Fixed Version: 3.1.1, 2.6.7
Link: CVE-2022-0235
| resource "aws_s3_bucket" "main" { | ||
| bucket = var.bucket | ||
|
|
||
| tags = var.tags != {} ? var.tags : {} | ||
| tags_all = var.tags_all != {} ? var.tags_all : {} | ||
| } |
Check failure
Code scanning / Trivy
S3 Access block should block public ACL High
Type: terraform
Vulnerability AVD-AWS-0086
Severity: HIGH
Message: No public access block so not blocking public acls
Link: AVD-AWS-0086
| resource "aws_s3_bucket" "main" { | ||
| bucket = var.bucket | ||
|
|
||
| tags = var.tags != {} ? var.tags : {} | ||
| tags_all = var.tags_all != {} ? var.tags_all : {} | ||
| } |
Check failure
Code scanning / Trivy
S3 Access block should block public policy High
Type: terraform
Vulnerability AVD-AWS-0087
Severity: HIGH
Message: No public access block so not blocking public policies
Link: AVD-AWS-0087
| resource "aws_s3_bucket" "main" { | ||
| bucket = var.bucket | ||
|
|
||
| tags = var.tags != {} ? var.tags : {} | ||
| tags_all = var.tags_all != {} ? var.tags_all : {} | ||
| } |
Check failure
Code scanning / Trivy
Unencrypted S3 bucket. High
Type: terraform
Vulnerability AVD-AWS-0088
Severity: HIGH
Message: Bucket does not have encryption enabled
Link: AVD-AWS-0088
| resource "aws_s3_bucket" "main" { | ||
| bucket = var.bucket | ||
|
|
||
| tags = var.tags != {} ? var.tags : {} | ||
| tags_all = var.tags_all != {} ? var.tags_all : {} | ||
| } |
Check failure
Code scanning / Trivy
S3 Access Block should Ignore Public ACL High
Type: terraform
Vulnerability AVD-AWS-0091
Severity: HIGH
Message: No public access block so not blocking public acls
Link: AVD-AWS-0091
| resource "aws_s3_bucket" "main" { | ||
| bucket = var.bucket | ||
|
|
||
| tags = var.tags != {} ? var.tags : {} | ||
| tags_all = var.tags_all != {} ? var.tags_all : {} | ||
| } |
Check failure
Code scanning / Trivy
S3 Access block should restrict public bucket to limit access High
Type: terraform
Vulnerability AVD-AWS-0093
Severity: HIGH
Message: No public access block so not restricting public buckets
Link: AVD-AWS-0093
| resource "aws_s3_bucket" "main" { | ||
| bucket = var.bucket | ||
|
|
||
| tags = var.tags != {} ? var.tags : {} | ||
| tags_all = var.tags_all != {} ? var.tags_all : {} | ||
| } |
Check failure
Code scanning / Trivy
S3 encryption should use Customer Managed Keys High
Type: terraform
Vulnerability AVD-AWS-0132
Severity: HIGH
Message: Bucket does not encrypt data with a customer managed key.
Link: AVD-AWS-0132
| description = "egress-https-from-service" | ||
|
|
||
| security_group_id = 1 | ||
| cidr_blocks = ["0.0.0.0/0"] |
Check failure
Code scanning / Trivy
A security group rule should not allow unrestricted egress to any IP address. Critical
Type: terraform
Vulnerability aws-vpc-no-public-egress-sgr
Severity: CRITICAL
Message: Security group rule allows unrestricted egress to any IP address.
Link: aws-vpc-no-public-egress-sgr
Signed-off-by: DBT pre-commit check
Signed-off-by: DBT pre-commit check
Trivy fs scan - Vulnerabilities detectedThe following vulnerabilities of HIGH or CRITICAL severity have been detected in the code. Please resolve these before merging the pull request. Type: npmTarget: package-lock.jsonSeverity: HIGHCVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor Type: uvTarget: uv.lockSeverity: HIGHCVE-2025-69223 aiohttp: AIOHTTP's HTTP Parser auto_decompress feature is vulnerable to zip bomb Severity: HIGHCVE-2026-21441 urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API) Type: terraformTarget: .Type: dockerfileTarget: DockerfileSeverity: HIGHDS002 Image user should not be 'root' Type: terraformTarget: s3.tfSeverity: HIGHAVD-AWS-0086 S3 Access block should block public ACL Severity: HIGHAVD-AWS-0087 S3 Access block should block public policy Severity: HIGHAVD-AWS-0088 Unencrypted S3 bucket. Severity: HIGHAVD-AWS-0091 S3 Access Block should Ignore Public ACL Severity: HIGHAVD-AWS-0093 S3 Access block should restrict public bucket to limit access Severity: HIGHAVD-AWS-0132 S3 encryption should use Customer Managed Keys Type: terraformTarget: security_groups.tfSeverity: CRITICALaws-vpc-no-public-egress-sgr A security group rule should not allow unrestricted egress to any IP address. |
What
Why
How this has been tested
Reviewer Checklist