Dataset Viewer
Auto-converted to Parquet Duplicate
id
string
provider
string
resource_type
string
address
string
actions
list
env
string
plan_after
dict
plan_before
null
text
string
labels
list
severity
string
explanation
string
source
string
azure:azurerm_storage_account:module.demo.azurerm_storage_account.0
azure
azurerm_storage_account
module.demo.azurerm_storage_account.0
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": true, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.0 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true}
[ "public_object_storage" ]
high
Public access setting detected for object storage.
synthetic
aws:aws_security_group:module.demo.aws_security_group.1
aws
aws_security_group
module.demo.aws_security_group.1
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_security_group address=module.demo.aws_security_group.1 actions=['create'] env=prod after={"env": "prod", "example": true}
[ "no_mfa_or_strong_auth" ]
low
Synthetic example.
synthetic
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.2
azure
azurerm_monitor_diagnostic_setting
module.demo.azurerm_monitor_diagnostic_setting.2
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": false, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.2 actions=['create'] env=dev after={"env": "dev", "example": true, "logging": false}
[ "missing_audit_logging" ]
medium
Centralized audit logging not configured.
synthetic
aws:aws_iam_policy:module.demo.aws_iam_policy.3
aws
aws_iam_policy
module.demo.aws_iam_policy.3
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": true, "rotation_enabled": null }
null
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.3 actions=['create'] env=prod after={"env": "prod", "example": true, "wildcard": true}
[ "wildcard_identity_permissions" ]
high
Broad identity permission pattern detected.
synthetic
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.4
azure
azurerm_role_assignment
module.demo.azurerm_role_assignment.4
[ "create", "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.4 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
[ "excessive_data_exposure" ]
medium
Synthetic example.
synthetic
aws:aws_security_group:module.demo.aws_security_group.5
aws
aws_security_group
module.demo.aws_security_group.5
[ "create", "update" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_security_group address=module.demo.aws_security_group.5 actions=['create', 'update'] env=staging after={"env": "staging", "example": true}
[ "missing_encryption_at_rest" ]
low
Synthetic example.
synthetic
aws:aws_kms_key:module.demo.aws_kms_key.6
aws
aws_kms_key
module.demo.aws_kms_key.6
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": false }
null
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.6 actions=['create'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false}
[ "missing_key_rotation" ]
medium
Key rotation appears disabled/missing.
synthetic
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.7
gcp
google_kms_crypto_key
module.demo.google_kms_crypto_key.7
[ "delete" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.7 actions=['delete'] env=dev after={"env": "dev", "example": true}
[ "no_mfa_or_strong_auth" ]
low
Synthetic example.
synthetic
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.8
gcp
google_storage_bucket_iam_member
module.demo.google_storage_bucket_iam_member.8
[ "delete" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.8 actions=['delete'] env=prod after={"env": "prod", "example": true}
[ "unknown_or_custom_risk" ]
low
Synthetic example.
synthetic
azure:azurerm_storage_account:module.demo.azurerm_storage_account.9
azure
azurerm_storage_account
module.demo.azurerm_storage_account.9
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": true, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.9 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true}
[ "public_object_storage" ]
high
Public access setting detected for object storage.
synthetic
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.10
gcp
google_storage_bucket_iam_member
module.demo.google_storage_bucket_iam_member.10
[ "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.10 actions=['update'] env=dev after={"env": "dev", "example": true}
[ "weak_network_segmentation" ]
medium
Synthetic example.
synthetic
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.11
gcp
google_kms_crypto_key
module.demo.google_kms_crypto_key.11
[ "update" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": false }
null
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.11 actions=['update'] env=staging after={"env": "staging", "example": true, "rotation_enabled": false}
[ "missing_key_rotation" ]
medium
Key rotation appears disabled/missing.
synthetic
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.12
azure
azurerm_key_vault_key
module.demo.azurerm_key_vault_key.12
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.12 actions=['create'] env=prod after={"env": "prod", "example": true}
[ "no_mfa_or_strong_auth" ]
low
Synthetic example.
synthetic
aws:aws_cloudtrail:module.demo.aws_cloudtrail.13
aws
aws_cloudtrail
module.demo.aws_cloudtrail.13
[ "create", "update" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_cloudtrail address=module.demo.aws_cloudtrail.13 actions=['create', 'update'] env=staging after={"env": "staging", "example": true}
[ "no_mfa_or_strong_auth" ]
low
Synthetic example.
synthetic
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.14
azure
azurerm_key_vault_key
module.demo.azurerm_key_vault_key.14
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.14 actions=['create'] env=dev after={"env": "dev", "example": true}
[ "missing_audit_logging" ]
medium
Synthetic example.
synthetic
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.15
gcp
google_storage_bucket_iam_member
module.demo.google_storage_bucket_iam_member.15
[ "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": true, "rotation_enabled": null }
null
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.15 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true}
[ "wildcard_identity_permissions" ]
high
Broad identity permission pattern detected.
synthetic
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.16
azure
azurerm_monitor_diagnostic_setting
module.demo.azurerm_monitor_diagnostic_setting.16
[ "create", "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.16 actions=['create', 'update'] env=prod after={"env": "prod", "example": true}
[ "missing_encryption_at_rest" ]
low
Synthetic example.
synthetic
aws:aws_iam_policy:module.demo.aws_iam_policy.17
aws
aws_iam_policy
module.demo.aws_iam_policy.17
[ "delete" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.17 actions=['delete'] env=prod after={"env": "prod", "example": true}
[ "unknown_or_custom_risk" ]
medium
Synthetic example.
synthetic
gcp:google_compute_firewall:module.demo.google_compute_firewall.18
gcp
google_compute_firewall
module.demo.google_compute_firewall.18
[ "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_compute_firewall address=module.demo.google_compute_firewall.18 actions=['update'] env=prod after={"env": "prod", "example": true}
[ "excessive_data_exposure" ]
low
Synthetic example.
synthetic
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.19
aws
aws_s3_bucket_public_access_block
module.demo.aws_s3_bucket_public_access_block.19
[ "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.19 actions=['update'] env=prod after={"env": "prod", "example": true}
[ "wildcard_identity_permissions" ]
medium
Synthetic example.
synthetic
azure:azurerm_storage_account:module.demo.azurerm_storage_account.20
azure
azurerm_storage_account
module.demo.azurerm_storage_account.20
[ "create", "update" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.20 actions=['create', 'update'] env=staging after={"env": "staging", "example": true}
[ "unknown_or_custom_risk" ]
medium
Synthetic example.
synthetic
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.21
azure
azurerm_key_vault_key
module.demo.azurerm_key_vault_key.21
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.21 actions=['create'] env=prod after={"env": "prod", "example": true}
[ "no_mfa_or_strong_auth" ]
medium
Synthetic example.
synthetic
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.22
azure
azurerm_key_vault_key
module.demo.azurerm_key_vault_key.22
[ "create" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.22 actions=['create'] env=staging after={"env": "staging", "example": true}
[ "excessive_data_exposure" ]
low
Synthetic example.
synthetic
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.23
azure
azurerm_key_vault_key
module.demo.azurerm_key_vault_key.23
[ "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.23 actions=['update'] env=prod after={"env": "prod", "example": true}
[ "missing_encryption_at_rest" ]
low
Synthetic example.
synthetic
aws:aws_kms_key:module.demo.aws_kms_key.24
aws
aws_kms_key
module.demo.aws_kms_key.24
[ "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.24 actions=['update'] env=prod after={"env": "prod", "example": true}
[ "no_mfa_or_strong_auth" ]
low
Synthetic example.
synthetic
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.25
azure
azurerm_key_vault_key
module.demo.azurerm_key_vault_key.25
[ "create", "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": false }
null
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.25 actions=['create', 'update'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false}
[ "missing_key_rotation" ]
medium
Key rotation appears disabled/missing.
synthetic
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.26
gcp
google_kms_crypto_key
module.demo.google_kms_crypto_key.26
[ "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": false }
null
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.26 actions=['update'] env=dev after={"env": "dev", "example": true, "rotation_enabled": false}
[ "missing_key_rotation" ]
medium
Key rotation appears disabled/missing.
synthetic
azure:azurerm_storage_account:module.demo.azurerm_storage_account.27
azure
azurerm_storage_account
module.demo.azurerm_storage_account.27
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": true, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.27 actions=['create'] env=prod after={"allow_public": true, "env": "prod", "example": true}
[ "public_object_storage" ]
high
Public access setting detected for object storage.
synthetic
aws:aws_iam_policy:module.demo.aws_iam_policy.28
aws
aws_iam_policy
module.demo.aws_iam_policy.28
[ "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.28 actions=['update'] env=dev after={"env": "dev", "example": true}
[ "excessive_data_exposure" ]
low
Synthetic example.
synthetic
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.29
gcp
google_project_iam_audit_config
module.demo.google_project_iam_audit_config.29
[ "create", "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.29 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
[ "missing_key_rotation" ]
medium
Synthetic example.
synthetic
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.30
gcp
google_kms_crypto_key
module.demo.google_kms_crypto_key.30
[ "create", "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.30 actions=['create', 'update'] env=prod after={"env": "prod", "example": true}
[ "missing_key_rotation" ]
low
Synthetic example.
synthetic
aws:aws_kms_key:module.demo.aws_kms_key.31
aws
aws_kms_key
module.demo.aws_kms_key.31
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.31 actions=['create'] env=prod after={"env": "prod", "example": true}
[ "unknown_or_custom_risk" ]
low
Synthetic example.
synthetic
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.32
aws
aws_s3_bucket_public_access_block
module.demo.aws_s3_bucket_public_access_block.32
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.32 actions=['create'] env=dev after={"env": "dev", "example": true}
[ "public_ingress" ]
low
Synthetic example.
synthetic
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.33
gcp
google_storage_bucket_iam_member
module.demo.google_storage_bucket_iam_member.33
[ "update" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.33 actions=['update'] env=staging after={"env": "staging", "example": true}
[ "excessive_data_exposure" ]
low
Synthetic example.
synthetic
azure:azurerm_network_security_group:module.demo.azurerm_network_security_group.34
azure
azurerm_network_security_group
module.demo.azurerm_network_security_group.34
[ "create", "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_network_security_group address=module.demo.azurerm_network_security_group.34 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
[ "excessive_data_exposure" ]
medium
Synthetic example.
synthetic
aws:aws_s3_bucket_public_access_block:module.demo.aws_s3_bucket_public_access_block.35
aws
aws_s3_bucket_public_access_block
module.demo.aws_s3_bucket_public_access_block.35
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_s3_bucket_public_access_block address=module.demo.aws_s3_bucket_public_access_block.35 actions=['create'] env=prod after={"env": "prod", "example": true}
[ "weak_network_segmentation" ]
medium
Synthetic example.
synthetic
gcp:google_project_iam_binding:module.demo.google_project_iam_binding.36
gcp
google_project_iam_binding
module.demo.google_project_iam_binding.36
[ "create", "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": true, "rotation_enabled": null }
null
provider=gcp type=google_project_iam_binding address=module.demo.google_project_iam_binding.36 actions=['create', 'update'] env=prod after={"env": "prod", "example": true, "wildcard": true}
[ "wildcard_identity_permissions" ]
high
Broad identity permission pattern detected.
synthetic
azure:azurerm_storage_account:module.demo.azurerm_storage_account.37
azure
azurerm_storage_account
module.demo.azurerm_storage_account.37
[ "create" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_storage_account address=module.demo.azurerm_storage_account.37 actions=['create'] env=staging after={"env": "staging", "example": true}
[ "missing_audit_logging" ]
low
Synthetic example.
synthetic
aws:aws_security_group:module.demo.aws_security_group.38
aws
aws_security_group
module.demo.aws_security_group.38
[ "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_security_group address=module.demo.aws_security_group.38 actions=['update'] env=prod after={"env": "prod", "example": true}
[ "excessive_data_exposure" ]
low
Synthetic example.
synthetic
gcp:google_compute_firewall:module.demo.google_compute_firewall.39
gcp
google_compute_firewall
module.demo.google_compute_firewall.39
[ "delete" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_compute_firewall address=module.demo.google_compute_firewall.39 actions=['delete'] env=staging after={"env": "staging", "example": true}
[ "missing_key_rotation" ]
low
Synthetic example.
synthetic
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.40
gcp
google_project_iam_audit_config
module.demo.google_project_iam_audit_config.40
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.40 actions=['create'] env=dev after={"env": "dev", "example": true}
[ "no_mfa_or_strong_auth" ]
low
Synthetic example.
synthetic
aws:aws_security_group:module.demo.aws_security_group.41
aws
aws_security_group
module.demo.aws_security_group.41
[ "update" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_security_group address=module.demo.aws_security_group.41 actions=['update'] env=staging after={"env": "staging", "example": true}
[ "excessive_data_exposure" ]
medium
Synthetic example.
synthetic
aws:aws_cloudtrail:module.demo.aws_cloudtrail.42
aws
aws_cloudtrail
module.demo.aws_cloudtrail.42
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_cloudtrail address=module.demo.aws_cloudtrail.42 actions=['create'] env=dev after={"env": "dev", "example": true}
[ "weak_network_segmentation" ]
medium
Synthetic example.
synthetic
gcp:google_kms_crypto_key:module.demo.google_kms_crypto_key.43
gcp
google_kms_crypto_key
module.demo.google_kms_crypto_key.43
[ "create", "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_kms_crypto_key address=module.demo.google_kms_crypto_key.43 actions=['create', 'update'] env=prod after={"env": "prod", "example": true}
[ "no_mfa_or_strong_auth" ]
medium
Synthetic example.
synthetic
aws:aws_security_group:module.demo.aws_security_group.44
aws
aws_security_group
module.demo.aws_security_group.44
[ "delete" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_security_group address=module.demo.aws_security_group.44 actions=['delete'] env=dev after={"env": "dev", "example": true}
[ "public_object_storage" ]
low
Synthetic example.
synthetic
azure:azurerm_key_vault_key:module.demo.azurerm_key_vault_key.45
azure
azurerm_key_vault_key
module.demo.azurerm_key_vault_key.45
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_key_vault_key address=module.demo.azurerm_key_vault_key.45 actions=['create'] env=dev after={"env": "dev", "example": true}
[ "no_mfa_or_strong_auth" ]
low
Synthetic example.
synthetic
aws:aws_iam_policy:module.demo.aws_iam_policy.46
aws
aws_iam_policy
module.demo.aws_iam_policy.46
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.46 actions=['create'] env=dev after={"env": "dev", "example": true}
[ "public_ingress" ]
low
Synthetic example.
synthetic
azure:azurerm_network_security_group:module.demo.azurerm_network_security_group.47
azure
azurerm_network_security_group
module.demo.azurerm_network_security_group.47
[ "create", "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_network_security_group address=module.demo.azurerm_network_security_group.47 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
[ "unknown_or_custom_risk" ]
low
Synthetic example.
synthetic
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.48
azure
azurerm_role_assignment
module.demo.azurerm_role_assignment.48
[ "create" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": true, "rotation_enabled": null }
null
provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.48 actions=['create'] env=prod after={"env": "prod", "example": true, "wildcard": true}
[ "wildcard_identity_permissions" ]
high
Broad identity permission pattern detected.
synthetic
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.49
azure
azurerm_role_assignment
module.demo.azurerm_role_assignment.49
[ "delete" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.49 actions=['delete'] env=staging after={"env": "staging", "example": true}
[ "missing_key_rotation" ]
medium
Synthetic example.
synthetic
aws:aws_kms_key:module.demo.aws_kms_key.50
aws
aws_kms_key
module.demo.aws_kms_key.50
[ "create", "update" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.50 actions=['create', 'update'] env=dev after={"env": "dev", "example": true}
[ "missing_encryption_at_rest" ]
medium
Synthetic example.
synthetic
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.51
gcp
google_storage_bucket_iam_member
module.demo.google_storage_bucket_iam_member.51
[ "create" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.51 actions=['create'] env=staging after={"env": "staging", "example": true}
[ "unknown_or_custom_risk" ]
low
Synthetic example.
synthetic
aws:aws_iam_policy:module.demo.aws_iam_policy.52
aws
aws_iam_policy
module.demo.aws_iam_policy.52
[ "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": true, "rotation_enabled": null }
null
provider=aws type=aws_iam_policy address=module.demo.aws_iam_policy.52 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true}
[ "wildcard_identity_permissions" ]
high
Broad identity permission pattern detected.
synthetic
gcp:google_storage_bucket_iam_member:module.demo.google_storage_bucket_iam_member.53
gcp
google_storage_bucket_iam_member
module.demo.google_storage_bucket_iam_member.53
[ "update" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_storage_bucket_iam_member address=module.demo.google_storage_bucket_iam_member.53 actions=['update'] env=staging after={"env": "staging", "example": true}
[ "missing_encryption_at_rest" ]
low
Synthetic example.
synthetic
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.54
gcp
google_project_iam_audit_config
module.demo.google_project_iam_audit_config.54
[ "delete" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.54 actions=['delete'] env=prod after={"env": "prod", "example": true}
[ "no_mfa_or_strong_auth" ]
low
Synthetic example.
synthetic
azure:azurerm_role_assignment:module.demo.azurerm_role_assignment.55
azure
azurerm_role_assignment
module.demo.azurerm_role_assignment.55
[ "delete" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": true, "rotation_enabled": null }
null
provider=azure type=azurerm_role_assignment address=module.demo.azurerm_role_assignment.55 actions=['delete'] env=prod after={"env": "prod", "example": true, "wildcard": true}
[ "wildcard_identity_permissions" ]
high
Broad identity permission pattern detected.
synthetic
aws:aws_kms_key:module.demo.aws_kms_key.56
aws
aws_kms_key
module.demo.aws_kms_key.56
[ "create" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=aws type=aws_kms_key address=module.demo.aws_kms_key.56 actions=['create'] env=dev after={"env": "dev", "example": true}
[ "wildcard_identity_permissions" ]
medium
Synthetic example.
synthetic
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.57
gcp
google_project_iam_audit_config
module.demo.google_project_iam_audit_config.57
[ "update" ]
prod
{ "example": true, "env": "prod", "allow_public": null, "logging": null, "wildcard": true, "rotation_enabled": null }
null
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.57 actions=['update'] env=prod after={"env": "prod", "example": true, "wildcard": true}
[ "wildcard_identity_permissions" ]
high
Broad identity permission pattern detected.
synthetic
gcp:google_project_iam_audit_config:module.demo.google_project_iam_audit_config.58
gcp
google_project_iam_audit_config
module.demo.google_project_iam_audit_config.58
[ "create", "update" ]
staging
{ "example": true, "env": "staging", "allow_public": null, "logging": null, "wildcard": null, "rotation_enabled": null }
null
provider=gcp type=google_project_iam_audit_config address=module.demo.google_project_iam_audit_config.58 actions=['create', 'update'] env=staging after={"env": "staging", "example": true}
[ "public_object_storage" ]
low
Synthetic example.
synthetic
azure:azurerm_monitor_diagnostic_setting:module.demo.azurerm_monitor_diagnostic_setting.59
azure
azurerm_monitor_diagnostic_setting
module.demo.azurerm_monitor_diagnostic_setting.59
[ "delete" ]
dev
{ "example": true, "env": "dev", "allow_public": null, "logging": false, "wildcard": null, "rotation_enabled": null }
null
provider=azure type=azurerm_monitor_diagnostic_setting address=module.demo.azurerm_monitor_diagnostic_setting.59 actions=['delete'] env=dev after={"env": "dev", "example": true, "logging": false}
[ "missing_audit_logging" ]
medium
Centralized audit logging not configured.
synthetic

Terraform Plan Risk Labels (Multi‑Cloud)

A dataset of Terraform plan JSON resource changes labeled with security/compliance risk categories (multi‑label) across AWS / GCP / Azure.

What it’s for

  • CI/CD pre-merge “risk scanning” of infrastructure changes
  • Fine-tuning / training a small classifier to predict risk labels from plan snippets
  • Bootstrapping deterministic OPA/Conftest policy packs (labels can be derived from policy denies)

Files

  • train.jsonl, validation.jsonl, test.jsonl
  • label_map.json (authoritative label list)
  • tools/ scripts to build your own dataset from real terraform show -json plans

Label taxonomy (v1)

public_object_storage, public_ingress, wildcard_identity_permissions, missing_key_rotation, missing_encryption_at_rest, missing_audit_logging, weak_network_segmentation, excessive_data_exposure, no_mfa_or_strong_auth, unknown_or_custom_risk

Schema (per row)

  • text: normalized text representation used for baseline models
  • plan_after / plan_before: structured objects (subset of plan JSON)
  • labels: list of risk labels (multi-label)
  • severity: low | medium | high
  • explanation: short human-readable reason
  • source: synthetic or real

Quick usage

from datasets import load_dataset

ds = load_dataset("bharathja/tfplan-risk-labels-multicloud", data_files={
    "train":"train.jsonl",
    "validation":"validation.jsonl",
    "test":"test.jsonl"
})
print(ds["train"][0]["labels"])
print(ds["train"][0]["text"][:250])

How to build your own from real plans (recommended)

  1. Export Terraform plan JSON:
terraform plan -out tfplan.bin
terraform show -json tfplan.bin > tfplan.json
  1. Convert to per-resource rows:
python tools/prepare_dataset.py --tfplan tfplan.json --out rows.jsonl --env prod
  1. Run Conftest and label using deny messages:
conftest test tfplan.json --policy policy --output json > conftest.json
python tools/label_with_conftest.py --rows rows.jsonl --conftest conftest.json --map tools/label_rules.json --out labeled.jsonl

Then split labeled.jsonl into train/validation/test and replace the provided JSONL files.

License

MIT

Downloads last month
9