Security Scanning #107
security-scan.yml
on: schedule
Static Application Security Testing
2m 33s
Dependency Vulnerability Scan
2s
Container Security Scan
8m 28s
Infrastructure Security Scan
1m 44s
Secret Scanning
7s
License Compliance Scan
3s
Security Policy Compliance
6s
Security Report
2s
Annotations
23 errors and 12 warnings
|
Dependency Vulnerability Scan
This request has been automatically failed because it uses a deprecated version of `actions/upload-artifact: v3`. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
|
License Compliance Scan
This request has been automatically failed because it uses a deprecated version of `actions/upload-artifact: v3`. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
|
Security Policy Compliance
Process completed with exit code 1.
|
|
Secret Scanning
Process completed with exit code 1.
|
|
Secret Scanning
BASE and HEAD commits are the same. TruffleHog won't scan anything. Please see documentation (https://github.com/trufflesecurity/trufflehog#octocat-trufflehog-github-action).
|
|
Infrastructure Security Scan
KICS scan failed with exit code 50
|
|
Infrastructure Security Scan
CodeQL Action major versions v1 and v2 have been deprecated. Please update all occurrences of the CodeQL Action in your workflow files to v3. For more information, see https://github.blog/changelog/2025-01-10-code-scanning-codeql-action-v2-is-now-deprecated/
|
|
Infrastructure Security Scan:
terraform/main.tf#L386
CKV_AWS_226: "Ensure DB instance gets all minor upgrades automatically"
|
|
Infrastructure Security Scan:
terraform/main.tf#L386
CKV_AWS_157: "Ensure that RDS instances have Multi-AZ enabled"
|
|
Infrastructure Security Scan:
terraform/main.tf#L236
CKV_AWS_39: "Ensure Amazon EKS public endpoint disabled"
|
|
Infrastructure Security Scan:
terraform/main.tf#L236
CKV_AWS_38: "Ensure Amazon EKS public endpoint not accessible to 0.0.0.0/0"
|
|
Infrastructure Security Scan:
terraform/main.tf#L219
CKV_AWS_23: "Ensure every security group and rule has a description"
|
|
Infrastructure Security Scan:
terraform/main.tf#L196
CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
|
|
Infrastructure Security Scan:
terraform/main.tf#L196
CKV_AWS_23: "Ensure every security group and rule has a description"
|
|
Infrastructure Security Scan:
terraform/main.tf#L180
CKV_AWS_382: "Ensure no security groups allow egress from 0.0.0.0:0 to port -1"
|
|
Infrastructure Security Scan:
terraform/main.tf#L180
CKV_AWS_23: "Ensure every security group and rule has a description"
|
|
Infrastructure Security Scan:
terraform/main.tf#L82
CKV_AWS_130: "Ensure VPC subnets do not assign public IP by default"
|
|
Static Application Security Testing
Path does not exist: semgrep.sarif
|
|
Static Application Security Testing
Path does not exist: bandit-results.sarif
|
|
Static Application Security Testing
CodeQL Action major versions v1 and v2 have been deprecated. Please update all occurrences of the CodeQL Action in your workflow files to v3. For more information, see https://github.blog/changelog/2025-01-10-code-scanning-codeql-action-v2-is-now-deprecated/
|
|
Static Application Security Testing
Process completed with exit code 2.
|
|
Container Security Scan
Unhandled exception. System.IO.IOException: No space left on device : '/home/runner/actions-runner/cached/_diag/Worker_20250911-022832-utc.log'
at System.IO.RandomAccess.WriteAtOffset(SafeFileHandle handle, ReadOnlySpan`1 buffer, Int64 fileOffset)
at System.IO.StreamWriter.Flush(Boolean flushStream, Boolean flushEncoder)
at System.Diagnostics.TextWriterTraceListener.Flush()
at System.Diagnostics.TraceSource.Flush()
at GitHub.Runner.Common.Tracing.Dispose(Boolean disposing)
at GitHub.Runner.Common.Tracing.Dispose()
at GitHub.Runner.Common.TraceManager.Dispose(Boolean disposing)
at GitHub.Runner.Common.TraceManager.Dispose()
at GitHub.Runner.Common.HostContext.Dispose(Boolean disposing)
at GitHub.Runner.Common.HostContext.Dispose()
at GitHub.Runner.Worker.Program.Main(String[] args)
System.IO.IOException: No space left on device : '/home/runner/actions-runner/cached/_diag/Worker_20250911-022832-utc.log'
at System.IO.RandomAccess.WriteAtOffset(SafeFileHandle handle, ReadOnlySpan`1 buffer, Int64 fileOffset)
at System.IO.StreamWriter.Flush(Boolean flushStream, Boolean flushEncoder)
at System.Diagnostics.TextWriterTraceListener.Flush()
at GitHub.Runner.Common.HostTraceListener.WriteHeader(String source, TraceEventType eventType, Int32 id)
at System.Diagnostics.TraceSource.TraceEvent(TraceEventType eventType, Int32 id, String message)
at GitHub.Runner.Worker.Worker.RunAsync(String pipeIn, String pipeOut)
at GitHub.Runner.Worker.Program.MainAsync(IHostContext context, String[] args)
System.IO.IOException: No space left on device : '/home/runner/actions-runner/cached/_diag/Worker_20250911-022832-utc.log'
at System.IO.RandomAccess.WriteAtOffset(SafeFileHandle handle, ReadOnlySpan`1 buffer, Int64 fileOffset)
at System.IO.StreamWriter.Flush(Boolean flushStream, Boolean flushEncoder)
at System.Diagnostics.TextWriterTraceListener.Flush()
at GitHub.Runner.Common.HostTraceListener.WriteHeader(String source, TraceEventType eventType, Int32 id)
at System.Diagnostics.TraceSource.TraceEvent(TraceEventType eventType, Int32 id, String message)
at GitHub.Runner.Common.Tracing.Error(Exception exception)
at GitHub.Runner.Worker.Program.MainAsync(IHostContext context, String[] args)
|
|
Security Report
This request has been automatically failed because it uses a deprecated version of `actions/download-artifact: v3`. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/. This request has been automatically failed because it uses a deprecated version of `actions/upload-artifact: v3`. Learn more: https://github.blog/changelog/2024-04-16-deprecation-notice-v3-of-the-artifact-actions/
|
|
[HIGH] Passwords And Secrets - Generic Password:
docker-compose.yml#L46
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
docker-compose.yml#L101
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
.gitlab-ci.yml#L97
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
.gitlab-ci.yml#L62
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
terraform/main.tf#L401
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] Passwords And Secrets - Generic Password:
.github/workflows/ci.yml#L76
Query to find passwords and secrets in infrastructure code.
|
|
[HIGH] KMS Key With Vulnerable Policy:
terraform/main.tf#L360
Checks if the policy is vulnerable and needs updating.
|
|
[HIGH] KMS Key With Vulnerable Policy:
terraform/main.tf#L563
Checks if the policy is vulnerable and needs updating.
|
|
[HIGH] KMS Key With Vulnerable Policy:
terraform/main.tf#L423
Checks if the policy is vulnerable and needs updating.
|
|
[HIGH] KMS Key With Vulnerable Policy:
terraform/main.tf#L771
Checks if the policy is vulnerable and needs updating.
|
|
Infrastructure Security Scan
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|
|
Infrastructure Security Scan
The `set-output` command is deprecated and will be disabled soon. Please upgrade to using Environment Files. For more information see: https://github.blog/changelog/2022-10-11-github-actions-deprecating-save-state-and-set-output-commands/
|