This repository has been archived by the owner on Oct 9, 2024. It is now read-only.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Check1
[GCP003][WARNING] Resource 'module.google_cloud:module.gcp_firewall:google_compute_firewall.allow_web' defines a fully open inbound firewall rule.
/home/gruber/projects/tf-free/modules/gcp/firewall/main.tf:11
Impact: The port is exposed for ingress from the internet
Resolution: Set a more restrictive cidr range
See https://tfsec.dev/docs/google/GCP003/ for more information.
Check2
[AWS012][ERROR] Resource 'module.aws:module.ec2:aws_instance.ec2' has a public IP address associated.
/home/gruber/projects/tf-free/modules/aws/ec2/main.tf:47
Impact: The instance or configuration is publically accessible
Resolution: Set the instance to not be publically accessible
See https://tfsec.dev/docs/aws/AWS012/ for more information.
Check3
[GEN001][WARNING] Variable 'module.aws:module.rds:variable.db_password' includes a potentially sensitive default value.
/home/gruber/projects/tf-free/modules/aws/rds/variables.tf:45
Impact: Default values could be exposing sensitive data
Resolution: Don't include sensitive data in variable defaults
See https://tfsec.dev/docs/general/GEN001/ for more information.
Check4
[AZU017][ERROR] Resource 'module.google_cloud:module.gcp_vpc:azurerm_network_security_group.ssh' has a .
/home/gruber/projects/tf-free/modules/azure/vpc/main.tf:13-29
Impact: Its dangerous to allow SSH access from the internet
Resolution: Block port 22 access from the internet
See https://tfsec.dev/docs/azure/AZU017/ for more information.
Check5
[GCP003][WARNING] Resource 'module.google_cloud:module.gcp_firewall:google_compute_firewall.allow_ssh' defines a fully open inbound firewall rule.
/home/gruber/projects/tf-free/modules/gcp/firewall/main.tf:24
Impact: The port is exposed for ingress from the internet
Resolution: Set a more restrictive cidr range
See https://tfsec.dev/docs/google/GCP003/ for more information.
Check6
[AZU017][ERROR] Resource 'module.aws:module.vpc:azurerm_network_security_group.ssh' has a .
/home/gruber/projects/tf-free/modules/azure/vpc/main.tf:13-29
Impact: Its dangerous to allow SSH access from the internet
Resolution: Block port 22 access from the internet
See https://tfsec.dev/docs/azure/AZU017/ for more information.
Check7
[AWS008][WARNING] Resource 'module.aws:module.ec2:aws_security_group.security_group' defines a fully open ingress security group.
/home/gruber/projects/tf-free/modules/aws/ec2/main.tf:11
Impact: The port is exposed for ingress from the internet
Resolution: Set a more restrictive cidr range
See https://tfsec.dev/docs/aws/AWS008/ for more information.
Check8
[AWS009][WARNING] Resource 'module.aws:module.ec2:aws_security_group.security_group' defines a fully open egress security group.
/home/gruber/projects/tf-free/modules/aws/ec2/main.tf:32
Impact: The port is exposed for egressing data to the internet
Resolution: Set a more restrictive cidr range
See https://tfsec.dev/docs/aws/AWS009/ for more information.
Check9
[AWS008][WARNING] Resource 'module.aws:module.ec2:aws_security_group.security_group' defines a fully open ingress security group.
/home/gruber/projects/tf-free/modules/aws/ec2/main.tf:18
Impact: The port is exposed for ingress from the internet
Resolution: Set a more restrictive cidr range
See https://tfsec.dev/docs/aws/AWS008/ for more information.
Check10
[AWS008][WARNING] Resource 'module.aws:module.ec2:aws_security_group.security_group' defines a fully open ingress security group.
/home/gruber/projects/tf-free/modules/aws/ec2/main.tf:25
Impact: The port is exposed for ingress from the internet
Resolution: Set a more restrictive cidr range
See https://tfsec.dev/docs/aws/AWS008/ for more information.
Check11
[GEN001][WARNING] Variable 'module.aws:variable.rds_password' includes a potentially sensitive default value.
/home/gruber/projects/tf-free/modules/aws/variables.tf:49
Impact: Default values could be exposing sensitive data
Resolution: Don't include sensitive data in variable defaults
See https://tfsec.dev/docs/general/GEN001/ for more information.
times
disk i/o 42.8751ms
parsing HCL 301.9µs
evaluating values 72.4109ms
running checks 17.7196ms
counts
files loaded 63
blocks 30
evaluated blocks 602
modules 18
module blocks 572
ignored checks 0
11 potential problems detected.