You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Trivy IaC scanning is good but noticed some IaC findings when scanning TF Cloud weren't being picked up. The results by Trivy get picked up but the ones in the AVD "found by CloudSploit" don't get picked up until it is running. It would be beneficial if these findings from CloudSploit get picked up when the code is still static so devs don't need to deploy the code to see these other misconfiguration.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Description
The Trivy IaC scanning is good but noticed some IaC findings when scanning TF Cloud weren't being picked up. The results by Trivy get picked up but the ones in the AVD "found by CloudSploit" don't get picked up until it is running. It would be beneficial if these findings from CloudSploit get picked up when the code is still static so devs don't need to deploy the code to see these other misconfiguration.
Example: https://avd.aquasec.com/misconfig/azure/blob-service/blob-container-cmk-encrypted/
the Plugins under CloudSploit (https://github.com/aquasecurity/cloudsploit/tree/master/plugins) should be added to the Trivy-Checks (https://github.com/aquasecurity/trivy-checks/tree/main/checks) to enhance the findings in static IaC scanning.
Target
None
Scanner
Misconfiguration
Beta Was this translation helpful? Give feedback.
All reactions