If you are using Terraform to manage your infrastructure, DeepSource is here to help you write the terraform files efficiently, free from security issues.
DeepSource now supports continuous static analysis for Terraform files, detecting 30+ security issues.
To start analyzing your Terraform files, just enable the terraform
analyzer in your .deepsource.toml
file, and you are good to go.
By default, DeepSource analyzes all your terraform files ending with .tf
.
version = 1
[[analyzers]]
name = "terraform"
enabled = true
Look at the docs for more details.
At the time of writing this, the analyzer detects 30+ security issues in your Terraform
files, which includes AWS
, AZURE
and GCP
specific issues apart from the general ones. Here’s some of them to give you an idea:
General security issues:
block attribute
default
value of variableAWS specific security issues:
ACL
defined for S3 Bucket
allows public accessSSL
policy by a load balancerGCP specific security issues:
ABAC
permissionsAZURE specific security issues:
SSH
keys/0
We’re super excited about this release, and are actively working on adding other issues to ensure best practices are followed in writing the terraform files. Head over to the docs or tell us what you think!