id
string | provider
string | resource_type
string | address
string | actions
list | env
string | plan_after
dict | plan_before
null | text
string | labels
list | severity
string | explanation
string | source
string |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
azure:azurerm_storage_account:module.demo.azurerm_storage_account.0
|
azure
|
azurerm_storage_account
|
module.demo.azurerm_storage_account.0
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": true,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.0 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true}
|
[
"public_object_storage"
] |
high
|
Public access setting detected for object storage.
|
synthetic
|
aws:aws_security_group:module.demo.aws_security_group.1
|
aws
|
aws_security_group
|
module.demo.aws_security_group.1
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_security_group address=module.demo.aws_security_group.1 actions=['create'] env=prod after={"env": "prod", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.2
|
azure
|
azurerm_monitor_diagnostic_setting
|
module.demo.azurerm_monitor_diagnostic_setting.2
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": false,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.2 actions=['create'] env=dev after={"env": "dev", "example": true, "logging": false}
|
[
"missing_audit_logging"
] |
medium
|
Centralized audit logging not configured.
|
synthetic
|
aws:aws_iam_policy:module.demo.aws_iam_policy.3
|
aws
|
aws_iam_policy
|
module.demo.aws_iam_policy.3
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
}
| null |
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.3 actions=['create'] env=prod after={"env": "prod", "example": true, "wildcard": true}
|
[
"wildcard_identity_permissions"
] |
high
|
Broad identity permission pattern detected.
|
synthetic
|
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.4
|
azure
|
azurerm_role_assignment
|
module.demo.azurerm_role_assignment.4
|
[
"create",
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.4 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
|
[
"excessive_data_exposure"
] |
medium
|
Synthetic example.
|
synthetic
|
aws:aws_security_group:module.demo.aws_security_group.5
|
aws
|
aws_security_group
|
module.demo.aws_security_group.5
|
[
"create",
"update"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_security_group address=module.demo.aws_security_group.5 actions=['create', 'update'] env=staging after={"env": "staging", "example": true}
|
[
"missing_encryption_at_rest"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_kms_key:module.demo.aws_kms_key.6
|
aws
|
aws_kms_key
|
module.demo.aws_kms_key.6
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": false
}
| null |
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.6 actions=['create'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false}
|
[
"missing_key_rotation"
] |
medium
|
Key rotation appears disabled/missing.
|
synthetic
|
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.7
|
gcp
|
google_kms_crypto_key
|
module.demo.google_kms_crypto_key.7
|
[
"delete"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.7 actions=['delete'] env=dev after={"env": "dev", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
low
|
Synthetic example.
|
synthetic
|
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.8
|
gcp
|
google_storage_bucket_iam_member
|
module.demo.google_storage_bucket_iam_member.8
|
[
"delete"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.8 actions=['delete'] env=prod after={"env": "prod", "example": true}
|
[
"unknown_or_custom_risk"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_storage_account:module.demo.azurerm_storage_account.9
|
azure
|
azurerm_storage_account
|
module.demo.azurerm_storage_account.9
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": true,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.9 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true}
|
[
"public_object_storage"
] |
high
|
Public access setting detected for object storage.
|
synthetic
|
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.10
|
gcp
|
google_storage_bucket_iam_member
|
module.demo.google_storage_bucket_iam_member.10
|
[
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.10 actions=['update'] env=dev after={"env": "dev", "example": true}
|
[
"weak_network_segmentation"
] |
medium
|
Synthetic example.
|
synthetic
|
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.11
|
gcp
|
google_kms_crypto_key
|
module.demo.google_kms_crypto_key.11
|
[
"update"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": false
}
| null |
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.11 actions=['update'] env=staging after={"env": "staging", "example": true, "rotation_enabled": false}
|
[
"missing_key_rotation"
] |
medium
|
Key rotation appears disabled/missing.
|
synthetic
|
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.12
|
azure
|
azurerm_key_vault_key
|
module.demo.azurerm_key_vault_key.12
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.12 actions=['create'] env=prod after={"env": "prod", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_cloudtrail:module.demo.aws_cloudtrail.13
|
aws
|
aws_cloudtrail
|
module.demo.aws_cloudtrail.13
|
[
"create",
"update"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_cloudtrail address=module.demo.aws_cloudtrail.13 actions=['create', 'update'] env=staging after={"env": "staging", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.14
|
azure
|
azurerm_key_vault_key
|
module.demo.azurerm_key_vault_key.14
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.14 actions=['create'] env=dev after={"env": "dev", "example": true}
|
[
"missing_audit_logging"
] |
medium
|
Synthetic example.
|
synthetic
|
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.15
|
gcp
|
google_storage_bucket_iam_member
|
module.demo.google_storage_bucket_iam_member.15
|
[
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
}
| null |
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.15 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true}
|
[
"wildcard_identity_permissions"
] |
high
|
Broad identity permission pattern detected.
|
synthetic
|
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.16
|
azure
|
azurerm_monitor_diagnostic_setting
|
module.demo.azurerm_monitor_diagnostic_setting.16
|
[
"create",
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.16 actions=['create', 'update'] env=prod after={"env": "prod", "example": true}
|
[
"missing_encryption_at_rest"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_iam_policy:module.demo.aws_iam_policy.17
|
aws
|
aws_iam_policy
|
module.demo.aws_iam_policy.17
|
[
"delete"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.17 actions=['delete'] env=prod after={"env": "prod", "example": true}
|
[
"unknown_or_custom_risk"
] |
medium
|
Synthetic example.
|
synthetic
|
gcp:google_compute_firewall:module.demo.google_compute_firewall.18
|
gcp
|
google_compute_firewall
|
module.demo.google_compute_firewall.18
|
[
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_compute_firewall address=module.demo.google_compute_firewall.18 actions=['update'] env=prod after={"env": "prod", "example": true}
|
[
"excessive_data_exposure"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.19
|
aws
|
aws_s3_bucket_public_access_block
|
module.demo.aws_s3_bucket_public_access_block.19
|
[
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.19 actions=['update'] env=prod after={"env": "prod", "example": true}
|
[
"wildcard_identity_permissions"
] |
medium
|
Synthetic example.
|
synthetic
|
azure:azurerm_storage_account:module.demo.azurerm_storage_account.20
|
azure
|
azurerm_storage_account
|
module.demo.azurerm_storage_account.20
|
[
"create",
"update"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.20 actions=['create', 'update'] env=staging after={"env": "staging", "example": true}
|
[
"unknown_or_custom_risk"
] |
medium
|
Synthetic example.
|
synthetic
|
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.21
|
azure
|
azurerm_key_vault_key
|
module.demo.azurerm_key_vault_key.21
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.21 actions=['create'] env=prod after={"env": "prod", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
medium
|
Synthetic example.
|
synthetic
|
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.22
|
azure
|
azurerm_key_vault_key
|
module.demo.azurerm_key_vault_key.22
|
[
"create"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.22 actions=['create'] env=staging after={"env": "staging", "example": true}
|
[
"excessive_data_exposure"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.23
|
azure
|
azurerm_key_vault_key
|
module.demo.azurerm_key_vault_key.23
|
[
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.23 actions=['update'] env=prod after={"env": "prod", "example": true}
|
[
"missing_encryption_at_rest"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_kms_key:module.demo.aws_kms_key.24
|
aws
|
aws_kms_key
|
module.demo.aws_kms_key.24
|
[
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.24 actions=['update'] env=prod after={"env": "prod", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.25
|
azure
|
azurerm_key_vault_key
|
module.demo.azurerm_key_vault_key.25
|
[
"create",
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": false
}
| null |
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.25 actions=['create', 'update'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false}
|
[
"missing_key_rotation"
] |
medium
|
Key rotation appears disabled/missing.
|
synthetic
|
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.26
|
gcp
|
google_kms_crypto_key
|
module.demo.google_kms_crypto_key.26
|
[
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": false
}
| null |
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.26 actions=['update'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false}
|
[
"missing_key_rotation"
] |
medium
|
Key rotation appears disabled/missing.
|
synthetic
|
azure:azurerm_storage_account:module.demo.azurerm_storage_account.27
|
azure
|
azurerm_storage_account
|
module.demo.azurerm_storage_account.27
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": true,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.27 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true}
|
[
"public_object_storage"
] |
high
|
Public access setting detected for object storage.
|
synthetic
|
aws:aws_iam_policy:module.demo.aws_iam_policy.28
|
aws
|
aws_iam_policy
|
module.demo.aws_iam_policy.28
|
[
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.28 actions=['update'] env=dev after={"env": "dev", "example": true}
|
[
"excessive_data_exposure"
] |
low
|
Synthetic example.
|
synthetic
|
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.29
|
gcp
|
google_project_iam_audit_config
|
module.demo.google_project_iam_audit_config.29
|
[
"create",
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.29 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
|
[
"missing_key_rotation"
] |
medium
|
Synthetic example.
|
synthetic
|
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.30
|
gcp
|
google_kms_crypto_key
|
module.demo.google_kms_crypto_key.30
|
[
"create",
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.30 actions=['create', 'update'] env=prod after={"env": "prod", "example": true}
|
[
"missing_key_rotation"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_kms_key:module.demo.aws_kms_key.31
|
aws
|
aws_kms_key
|
module.demo.aws_kms_key.31
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.31 actions=['create'] env=prod after={"env": "prod", "example": true}
|
[
"unknown_or_custom_risk"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.32
|
aws
|
aws_s3_bucket_public_access_block
|
module.demo.aws_s3_bucket_public_access_block.32
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.32 actions=['create'] env=dev after={"env": "dev", "example": true}
|
[
"public_ingress"
] |
low
|
Synthetic example.
|
synthetic
|
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.33
|
gcp
|
google_storage_bucket_iam_member
|
module.demo.google_storage_bucket_iam_member.33
|
[
"update"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.33 actions=['update'] env=staging after={"env": "staging", "example": true}
|
[
"excessive_data_exposure"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_network_security_group:module.demo.azurerm_network_security_group.34
|
azure
|
azurerm_network_security_group
|
module.demo.azurerm_network_security_group.34
|
[
"create",
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_network_security_group address=module.demo.azurerm_network_security_group.34 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
|
[
"excessive_data_exposure"
] |
medium
|
Synthetic example.
|
synthetic
|
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.35
|
aws
|
aws_s3_bucket_public_access_block
|
module.demo.aws_s3_bucket_public_access_block.35
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.35 actions=['create'] env=prod after={"env": "prod", "example": true}
|
[
"weak_network_segmentation"
] |
medium
|
Synthetic example.
|
synthetic
|
gcp:google_project_iam_binding:module.demo.google_project_iam_binding.36
|
gcp
|
google_project_iam_binding
|
module.demo.google_project_iam_binding.36
|
[
"create",
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
}
| null |
provider=gcp type=google_project_iam_binding address=module.demo.google_project_iam_binding.36 actions=['create', 'update'] env=prod after={"env": "prod", "example": true, "wildcard": true}
|
[
"wildcard_identity_permissions"
] |
high
|
Broad identity permission pattern detected.
|
synthetic
|
azure:azurerm_storage_account:module.demo.azurerm_storage_account.37
|
azure
|
azurerm_storage_account
|
module.demo.azurerm_storage_account.37
|
[
"create"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.37 actions=['create'] env=staging after={"env": "staging", "example": true}
|
[
"missing_audit_logging"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_security_group:module.demo.aws_security_group.38
|
aws
|
aws_security_group
|
module.demo.aws_security_group.38
|
[
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_security_group address=module.demo.aws_security_group.38 actions=['update'] env=prod after={"env": "prod", "example": true}
|
[
"excessive_data_exposure"
] |
low
|
Synthetic example.
|
synthetic
|
gcp:google_compute_firewall:module.demo.google_compute_firewall.39
|
gcp
|
google_compute_firewall
|
module.demo.google_compute_firewall.39
|
[
"delete"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_compute_firewall address=module.demo.google_compute_firewall.39 actions=['delete'] env=staging after={"env": "staging", "example": true}
|
[
"missing_key_rotation"
] |
low
|
Synthetic example.
|
synthetic
|
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.40
|
gcp
|
google_project_iam_audit_config
|
module.demo.google_project_iam_audit_config.40
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.40 actions=['create'] env=dev after={"env": "dev", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_security_group:module.demo.aws_security_group.41
|
aws
|
aws_security_group
|
module.demo.aws_security_group.41
|
[
"update"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_security_group address=module.demo.aws_security_group.41 actions=['update'] env=staging after={"env": "staging", "example": true}
|
[
"excessive_data_exposure"
] |
medium
|
Synthetic example.
|
synthetic
|
aws:aws_cloudtrail:module.demo.aws_cloudtrail.42
|
aws
|
aws_cloudtrail
|
module.demo.aws_cloudtrail.42
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_cloudtrail address=module.demo.aws_cloudtrail.42 actions=['create'] env=dev after={"env": "dev", "example": true}
|
[
"weak_network_segmentation"
] |
medium
|
Synthetic example.
|
synthetic
|
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.43
|
gcp
|
google_kms_crypto_key
|
module.demo.google_kms_crypto_key.43
|
[
"create",
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.43 actions=['create', 'update'] env=prod after={"env": "prod", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
medium
|
Synthetic example.
|
synthetic
|
aws:aws_security_group:module.demo.aws_security_group.44
|
aws
|
aws_security_group
|
module.demo.aws_security_group.44
|
[
"delete"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_security_group address=module.demo.aws_security_group.44 actions=['delete'] env=dev after={"env": "dev", "example": true}
|
[
"public_object_storage"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.45
|
azure
|
azurerm_key_vault_key
|
module.demo.azurerm_key_vault_key.45
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.45 actions=['create'] env=dev after={"env": "dev", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_iam_policy:module.demo.aws_iam_policy.46
|
aws
|
aws_iam_policy
|
module.demo.aws_iam_policy.46
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.46 actions=['create'] env=dev after={"env": "dev", "example": true}
|
[
"public_ingress"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_network_security_group:module.demo.azurerm_network_security_group.47
|
azure
|
azurerm_network_security_group
|
module.demo.azurerm_network_security_group.47
|
[
"create",
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_network_security_group address=module.demo.azurerm_network_security_group.47 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
|
[
"unknown_or_custom_risk"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.48
|
azure
|
azurerm_role_assignment
|
module.demo.azurerm_role_assignment.48
|
[
"create"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.48 actions=['create'] env=prod after={"env": "prod", "example": true, "wildcard": true}
|
[
"wildcard_identity_permissions"
] |
high
|
Broad identity permission pattern detected.
|
synthetic
|
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.49
|
azure
|
azurerm_role_assignment
|
module.demo.azurerm_role_assignment.49
|
[
"delete"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.49 actions=['delete'] env=staging after={"env": "staging", "example": true}
|
[
"missing_key_rotation"
] |
medium
|
Synthetic example.
|
synthetic
|
aws:aws_kms_key:module.demo.aws_kms_key.50
|
aws
|
aws_kms_key
|
module.demo.aws_kms_key.50
|
[
"create",
"update"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.50 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
|
[
"missing_encryption_at_rest"
] |
medium
|
Synthetic example.
|
synthetic
|
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.51
|
gcp
|
google_storage_bucket_iam_member
|
module.demo.google_storage_bucket_iam_member.51
|
[
"create"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.51 actions=['create'] env=staging after={"env": "staging", "example": true}
|
[
"unknown_or_custom_risk"
] |
low
|
Synthetic example.
|
synthetic
|
aws:aws_iam_policy:module.demo.aws_iam_policy.52
|
aws
|
aws_iam_policy
|
module.demo.aws_iam_policy.52
|
[
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
}
| null |
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.52 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true}
|
[
"wildcard_identity_permissions"
] |
high
|
Broad identity permission pattern detected.
|
synthetic
|
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.53
|
gcp
|
google_storage_bucket_iam_member
|
module.demo.google_storage_bucket_iam_member.53
|
[
"update"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.53 actions=['update'] env=staging after={"env": "staging", "example": true}
|
[
"missing_encryption_at_rest"
] |
low
|
Synthetic example.
|
synthetic
|
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.54
|
gcp
|
google_project_iam_audit_config
|
module.demo.google_project_iam_audit_config.54
|
[
"delete"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.54 actions=['delete'] env=prod after={"env": "prod", "example": true}
|
[
"no_mfa_or_strong_auth"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.55
|
azure
|
azurerm_role_assignment
|
module.demo.azurerm_role_assignment.55
|
[
"delete"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.55 actions=['delete'] env=prod after={"env": "prod", "example": true, "wildcard": true}
|
[
"wildcard_identity_permissions"
] |
high
|
Broad identity permission pattern detected.
|
synthetic
|
aws:aws_kms_key:module.demo.aws_kms_key.56
|
aws
|
aws_kms_key
|
module.demo.aws_kms_key.56
|
[
"create"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.56 actions=['create'] env=dev after={"env": "dev", "example": true}
|
[
"wildcard_identity_permissions"
] |
medium
|
Synthetic example.
|
synthetic
|
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.57
|
gcp
|
google_project_iam_audit_config
|
module.demo.google_project_iam_audit_config.57
|
[
"update"
] |
prod
|
{
"example": true,
"env": "prod",
"allow_public": null,
"logging": null,
"wildcard": true,
"rotation_enabled": null
}
| null |
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.57 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true}
|
[
"wildcard_identity_permissions"
] |
high
|
Broad identity permission pattern detected.
|
synthetic
|
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.58
|
gcp
|
google_project_iam_audit_config
|
module.demo.google_project_iam_audit_config.58
|
[
"create",
"update"
] |
staging
|
{
"example": true,
"env": "staging",
"allow_public": null,
"logging": null,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.58 actions=['create', 'update'] env=staging after={"env": "staging", "example": true}
|
[
"public_object_storage"
] |
low
|
Synthetic example.
|
synthetic
|
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.59
|
azure
|
azurerm_monitor_diagnostic_setting
|
module.demo.azurerm_monitor_diagnostic_setting.59
|
[
"delete"
] |
dev
|
{
"example": true,
"env": "dev",
"allow_public": null,
"logging": false,
"wildcard": null,
"rotation_enabled": null
}
| null |
provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.59 actions=['delete'] env=dev after={"env": "dev", "example": true, "logging": false}
|
[
"missing_audit_logging"
] |
medium
|
Centralized audit logging not configured.
|
synthetic
|
Terraform Plan Risk Labels (Multi‑Cloud)
A dataset of Terraform plan JSON resource changes labeled with security/compliance risk categories (multi‑label) across AWS / GCP / Azure.
What it’s for
- CI/CD pre-merge “risk scanning” of infrastructure changes
- Fine-tuning / training a small classifier to predict risk labels from plan snippets
- Bootstrapping deterministic OPA/Conftest policy packs (labels can be derived from policy denies)
Files
train.jsonl,validation.jsonl,test.jsonllabel_map.json(authoritative label list)tools/scripts to build your own dataset from realterraform show -jsonplans
Label taxonomy (v1)
public_object_storage, public_ingress, wildcard_identity_permissions, missing_key_rotation, missing_encryption_at_rest, missing_audit_logging, weak_network_segmentation, excessive_data_exposure, no_mfa_or_strong_auth, unknown_or_custom_risk
Schema (per row)
text: normalized text representation used for baseline modelsplan_after/plan_before: structured objects (subset of plan JSON)labels: list of risk labels (multi-label)severity:low | medium | highexplanation: short human-readable reasonsource:syntheticorreal
Quick usage
from datasets import load_dataset
ds = load_dataset("bharathja/tfplan-risk-labels-multicloud", data_files={
"train":"train.jsonl",
"validation":"validation.jsonl",
"test":"test.jsonl"
})
print(ds["train"][0]["labels"])
print(ds["train"][0]["text"][:250])
How to build your own from real plans (recommended)
- Export Terraform plan JSON:
terraform plan -out tfplan.bin
terraform show -json tfplan.bin > tfplan.json
- Convert to per-resource rows:
python tools/prepare_dataset.py --tfplan tfplan.json --out rows.jsonl --env prod
- Run Conftest and label using deny messages:
conftest test tfplan.json --policy policy --output json > conftest.json
python tools/label_with_conftest.py --rows rows.jsonl --conftest conftest.json --map tools/label_rules.json --out labeled.jsonl
Then split labeled.jsonl into train/validation/test and replace the provided JSONL files.
License
MIT
- Downloads last month
- 9