tfsec

Security scanner for your Terraform code

MIT License

Downloads
6.7K
Stars
6.6K
Committers
119

Bot releases are hidden (Show)

tfsec - tfsec v0.34.0

Published by liamg almost 4 years ago

  • Upgrade to HCL 2.7.0
  • Ignore HCL errors when parsing
tfsec - tfsec v0.33.0

Published by liamg almost 4 years ago

  • Add run statistics in default output
  • Add option to override the custom check directory (--custom-check-dir)
  • Add functionality for wildcard labels and regexMatches
tfsec - tfsec v0.32.1

Published by liamg almost 4 years ago

  • Fix for check generation
tfsec - tfsec v0.32.0

Published by liamg almost 4 years ago

tfsec - tfsec v0.31.0

Published by liamg almost 4 years ago

  • Parsing time has been greatly reduced (estimated 10x faster).
  • Documentation has been added for all checks.
  • Documentation is now built into check code and deployed to https://tfsec.dev instead of the wiki.
  • Added custom check functionality.
  • Added a guide for contributing checks.
  • Added a snazzy new logo.
  • Checks are always run in the same order to ensure consistent behaviour.
  • Terraform files are now only parsed in the given directory - files are no longer parsed recursively.
  • Modules are now fully supported (a terraform init is required.)
  • Fixed various panics across multiple checks/parsing functions.
  • All example code in documentation is now automatically tested.
  • Fixed AWS046 issue with IAM policy wildcards when Deny is used.
  • Fixed IPv6 CIDR message in AWS006.
  • Fixed issue with severity sometimes showing as blank in all output formats.
tfsec - tfsec v0.30.1

Published by liamg about 4 years ago

  • Fixed output error
tfsec - tfsec v0.30.0

Published by owenrumney about 4 years ago

  • add check for wildcard policy actions
  • add check for hard coded creds in aws provider
  • add check for WAF when using Cloud front
tfsec - tfsec v0.29.0

Published by liamg about 4 years ago

  • More AWS IAM password policy checks
tfsec - tfsec v0.28.1

Published by liamg about 4 years ago

  • Fix image publishing
tfsec - tfsec v0.28.0

Published by liamg about 4 years ago

  • Check for AWS IAM password reuse prevention
tfsec - tfsec v0.27.0

Published by liamg about 4 years ago

  • Check CloudFront security policy version >= TLSv1.2_2019
  • Add check for encryption at rest for Elasticsearch domains
  • Add checks for encryption at rest and in transit for Elasticache
  • Add GCP IAM user grant check
tfsec - tfsec v0.26.0

Published by liamg about 4 years ago

  • Add plain text output
tfsec - tfsec v0.25.0

Published by liamg about 4 years ago

  • Option to output to file (--out)
  • New check: API Gateway domain name uses outdated SSL/TLS protocols.
tfsec - tfsec v0.24.1

Published by liamg over 4 years ago

  • Fixes detection of open security group rules in AWS, specifically for IPv6 CIDRs
tfsec - tfsec v0.24.0

Published by liamg over 4 years ago

  • Added multiple GKE checks
tfsec - tfsec v0.23.2

Published by liamg over 4 years ago

  • Fixes docker push issue
tfsec - tfsec v0.23.1

Published by liamg over 4 years ago

  • Publish images to docker hub
tfsec - tfsec v0.23.0

Published by liamg over 4 years ago

  • Add support for Terraform function evaluation, e.g. concat etc.
  • Add support for .tfvars files.
  • Allow gcp bucket without default key
  • Whitelist aws_instance.get_password_data to avoid GEN003 false positives
tfsec - tfsec v0.22.0

Published by liamg over 4 years ago

  • Add whitelisting to avoid false positives for generic sensitive attributes
  • Add parse caching to avoid hanging during scans
  • Improve JUnit output for better Bitbucket integration
  • Moved warnings about skipped checks to stderr to prevent malformed Junit etc. output
  • Added support for dynamic blocks utilising for_each
  • Checks are now done for multiple egress/ingress blocks in security groups
  • Added --exclude-dir [directory] flag to exclude directories from scans
  • Check access param of azure sg rules
tfsec - tfsec v0.21.0

Published by liamg over 4 years ago

  • New: AWS023: Ensure ECR repository image scans are enabled
  • New: AWS024: Ensure Kinesis streams have encryption enabled