Skip to content

devsec-scan

devsec-scan #246

Workflow file for this run

name: devsec-scan
on:
schedule:
- cron: '0 */4 * * 1-5'
jobs:
devsec:
runs-on: ubuntu-latest
permissions:
security-events: write
steps:
- uses: actions/checkout@v4
- uses: aquasecurity/[email protected]
with:
tfsec_args: --force-all-dirs --soft-fail -m=HIGH -e=github-repositories-private,github-branch_protections-require_signed_commits,github-actions-no-plain-text-action-secrets,aws-iam-no-policy-wildcards,aws-ecr-enforce-immutable-repository,aws-rds-enable-performance-insights-encryption,aws-s3-encryption-customer-key,aws-sqs-enable-queue-encryption
sarif_file: tfsec.sarif
- uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: tfsec.sarif