Critical

TitleLanguage
User data for EC2 instances must not contain sensitive AWS keysterraform
User data for EC2 instances must not contain sensitive AWS keysterraform
Use of plain HTTP.terraform
Use of plain HTTP.terraform
Use of Hard-coded Credentialsjavascript
Use of Hard-coded Credentialsregex
Unintended Proxy or Intermediary ('Confused Deputy')yaml
Tiller Is Deployedterraform
The S3 Bucket backing Cloudtrail should be privateterraform
The minimum TLS version for Storage Accounts should be TLS1_2terraform
The load balancer forwarding rule is using an insecure protocol as an entrypointterraform
The firewall has an outbound rule with open accessterraform
The firewall has an inbound rule with open accessterraform
The encryption key used to encrypt a compute disk has been specified in plaintext.terraform
The default action on Storage account network rules should be set to denyterraform
Task definition defines sensitive environment variable(s).terraform
system:authenticate group access bindingterraform
system:authenticate group access bindingterraform
SSL policies should enforce secure versions of TLSterraform
SSH access should not be accessible from the Internet, should be blocked on port 22terraform
Spaces bucket or bucket object has public read acl setterraform
Secrets should not be exfiltrated using Terraform HTTP data blocksterraform
RUN using 'sudoterraform
RDP access should not be accessible from the Internet, should be blocked on port 3389terraform
No wildcard verb rolesterraform
No wildcard verb and resource rolesterraform
No Root Access Keysterraform
Multiple ENTRYPOINT instructions listedterraform
Missing security group for vpnGateway.terraform
Missing security group for router.terraform
Missing security group for instance.terraform
Manage webhookconfigurationsterraform
Manage secretsterraform
Manage Kubernetes RBAC resourcesterraform
Manage EKS IAM Auth ConfigMapterraform
Manage all resources at the namespaceterraform
Manage all resourcesterraform
Kubernetes Auto Upgrades Not Enabledterraform
Key vault should have the network acl block specifiedterraform
Instances should not use the default service accountterraform
Incorrect Calculationsolidity
Improper Restriction of XML External Entity Referencejavascript
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')javascript
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')java
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')yaml
Improper Neutralization of Special Elements in Data Query Logicapex
Improper Neutralization of Special Elements in Data Query Logicapex
Improper Input Validationsolidity
Improper Control of Generation of Code ('Code Injection')yaml
Improper Access Controlsolidity
GitHub repository shouldn't be public.terraform
Function Call With Incorrect Variable or Reference as Argumentsolidity
Exposed port out of rangeterraform
Execution with Unnecessary Privilegesyaml
Ensure the Function App can only be accessed via HTTPS. The default is false.terraform
Ensure that the Kubernetes PKI key file permission is set to 600terraform
Ensure that the Kubernetes PKI directory and file file ownership is set to root:rootterraform
Ensure that the kubelet service file ownership is set to root:rootterraform
Ensure that the Kubelet only makes use of Strong Cryptographic Ciphersterraform
Ensure that the client certificate authorities file ownership is set to root:rootterraform
Ensure that the certificate authorities file permissions are set to 600 or more restrictiveterraform
Ensure that the admin config file permissions are set to 600 or more restrictiveterraform
Ensure that the admin config file ownership is set to root:rootterraform
Ensure that the --tls-key-file argument are set as appropriateterraform
Ensure that the --tls-cert-file argument are set as appropriateterraform
Ensure that the --client-ca-file argument is set as appropriateterraform
Ensure that the --anonymous-auth argument is set to falseterraform
Ensure that lambda function permission has a source arn specifiedterraform
Ensure AKS has an API Server Authorized IP Ranges enabledterraform
Enforce Root Mfaterraform
Elasticsearch doesn't enforce HTTPS traffic.terraform
EKS Clusters should have the public access disabledterraform
EKS cluster should not have open CIDR range for public accessterraform
Duplicate aliases defined in different FROMsterraform
Do not allow impersonation of privileged groupsterraform
Deserialization of Untrusted Datajavascript
Delete verified recordterraform
Data Factory should have public access disabled, the default is enabled.terraform
COPY with more than two arguments not ending with slashterraform
COPY '--from' referring to the current imageterraform
Compute instance requests an IP reservation from a public poolterraform
CloudFront distribution allows unencrypted (HTTP) communications.terraform
BigQuery datasets should only be accessible within the organisationterraform
AWS Classic resource usage.terraform
AWS Classic resource usage.terraform
Anonymous user access bindingterraform
An outdated SSL policy is in use by a load balancer.terraform
An outdated SSL policy is in use by a load balancer.terraform
An outbound network security rule allows traffic to /0.terraform
An outbound firewall rule allows traffic to /0.terraform
An Network ACL rule allows ALL ports.terraform
An ingress security group rule allows traffic from /0.terraform
An ingress security group rule allows traffic from /0.terraform
An ingress Network ACL rule allows specific ports from /0.terraform
An ingress nas security group rule allows traffic from /0.terraform
An ingress db security group rule allows traffic from /0.terraform
An inbound network security rule allows traffic from /0.terraform
An inbound firewall rule allows traffic from /0.terraform
An egress security group rule allows traffic to /0.terraform
A database resource is marked as publicly accessible.terraform