docs: Update installation instructions and enhance API documentation … #6
security-scan.yml
on: push
Static Application Security Testing
2m 14s
Dependency Vulnerability Scan
0s
Container Security Scan
8m 6s
Infrastructure Security Scan
1m 41s
Secret Scanning
5s
License Compliance Scan
0s
Security Policy Compliance
2s
Security Report
0s
Annotations
28 errors and 13 warnings
|
License Compliance Scan
This request has been automatically failed because it uses a deprecated version of `actions/upload-artifact: v3`. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
|
Dependency Vulnerability Scan
This request has been automatically failed because it uses a deprecated version of `actions/upload-artifact: v3`. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
|
Security Policy Compliance
Process completed with exit code 1.
|
|
Secret Scanning
BASE and HEAD commits are the same. TruffleHog won't scan anything. Please see documentation (https://github.com/trufflesecurity/trufflehog#octocat-trufflehog-github-action).
|
|
Secret Scanning
Process completed with exit code 1.
|
|
Infrastructure Security Scan:
terraform/main.tf#L82
CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
|
|
Infrastructure Security Scan:
terraform/main.tf#L180
CKV_AWS_23: "Ensure every security group and rule has a description"
|
|
Infrastructure Security Scan:
terraform/main.tf#L180
CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
|
|
Infrastructure Security Scan:
terraform/main.tf#L196
CKV_AWS_23: "Ensure every security group and rule has a description"
|
|
Infrastructure Security Scan:
terraform/main.tf#L196
CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
|
|
Infrastructure Security Scan:
terraform/main.tf#L219
CKV_AWS_23: "Ensure every security group and rule has a description"
|
|
Infrastructure Security Scan:
terraform/main.tf#L236
CKV_AWS_38: "Ensure Amazon EKS public endpoint not accessible to 0.0.0.0/0"
|
|
Infrastructure Security Scan:
terraform/main.tf#L236
CKV_AWS_39: "Ensure Amazon EKS public endpoint disabled"
|
|
Infrastructure Security Scan:
terraform/main.tf#L386
CKV_AWS_157: "Ensure that RDS instances have Multi-AZ enabled"
|
|
Infrastructure Security Scan:
terraform/main.tf#L386
CKV_AWS_293: "Ensure that AWS database instances have deletion protection enabled"
|
|
Infrastructure Security Scan
KICS scan failed with exit code 50
|
|
Infrastructure Security Scan
CodeQL Action major versions v1 and v2 have been deprecated. Please update all occurrences of the CodeQL Action in your workflow files to v3. For more information, see https://github.blog/changelog/2025-01-10-code-scanning-codeql-action-v2-is-now-deprecated/
|
|
Static Application Security Testing
Path does not exist: semgrep.sarif
|
|
Static Application Security Testing
Process completed with exit code 2.
|
|
Static Application Security Testing
CodeQL Action major versions v1 and v2 have been deprecated. Please update all occurrences of the CodeQL Action in your workflow files to v3. For more information, see https://github.blog/changelog/2025-01-10-code-scanning-codeql-action-v2-is-now-deprecated/
|
|
Static Application Security Testing
Path does not exist: bandit-results.sarif
|
|
Container Security Scan
Process completed with exit code 1.
|
|
Container Security Scan
CodeQL Action major versions v1 and v2 have been deprecated. Please update all occurrences of the CodeQL Action in your workflow files to v3. For more information, see https://github.blog/changelog/2025-01-10-code-scanning-codeql-action-v2-is-now-deprecated/
|
|
Container Security Scan
Path does not exist: trivy-results.sarif
|
|
Container Security Scan
could not authenticate: user githubactions not entitled to use Docker Scout
|
|
Container Security Scan
Input required and not supplied: sarif_file
|
|
Container Security Scan
Path does not exist: scout-results.sarif
|
|
Security Report
This request has been automatically failed because it uses a deprecated version of `actions/download-artifact: v3`. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/. This request has been automatically failed because it uses a deprecated version of `actions/upload-artifact: v3`. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
|
Infrastructure Security Scan
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
|
Infrastructure Security Scan
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
|
[HIGH] KMS Key With Vulnerable Policy:
terraform/main.tf#L563
Checks if the policy is vulnerable and needs updating.
|
|
[HIGH] KMS Key With Vulnerable Policy:
terraform/main.tf#L360
Checks if the policy is vulnerable and needs updating.
|
|
[HIGH] KMS Key With Vulnerable Policy:
terraform/main.tf#L771
Checks if the policy is vulnerable and needs updating.
|
|
[HIGH] KMS Key With Vulnerable Policy:
terraform/main.tf#L423
Checks if the policy is vulnerable and needs updating.
|
|
[HIGH] Passwords And Secrets - Generic Password:
docker-compose.yml#L101
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
terraform/main.tf#L401
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
.gitlab-ci.yml#L62
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
.github/workflows/ci.yml#L76
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
docker-compose.yml#L46
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
.gitlab-ci.yml#L97
Query to find passwords and secrets in infrastructure code.
|
|
Container Security Scan
You are running out of disk space. The runner will stop working when the machine runs out of disk space. Free space left: 81 MB
|