Skip to content

Commit

Permalink
fix(queries): add suffix In Defaults for Ansible config queries (#7314)
Browse files Browse the repository at this point in the history
* add suffix In Defaults for ansible config queries

* fix nifcloud readme
  • Loading branch information
cx-ruiaraujo authored Jan 17, 2025
1 parent 4bf94f2 commit b7ff43f
Show file tree
Hide file tree
Showing 27 changed files with 23 additions and 23 deletions.
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -193,7 +193,7 @@ Find security vulnerabilities, compliance issues, and infrastructure misconfigur
</a>
</td>
<td>
<a href="https://github.com/Checkmarx/kics/blob/master/docs/platforms.md#nifcloud_for_terraform">
<a href="https://github.com/Checkmarx/kics/blob/master/docs/platforms.md#nifcloud-for-terraform">
<img alt="NIFCloud" src="docs/img/logo-nifcloud.png" width="110">
</a>
</td>
Expand Down

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"id": "86b97bb4-85c9-462d-8635-cbc057c5c8c5",
"queryName": "Allow Unsafe Lookups Enabled",
"queryName": "Allow Unsafe Lookups Enabled In Defaults",
"severity": "HIGH",
"category": "Insecure Configurations",
"descriptionText": "When enabled, this option allows lookup plugins to return data that is not marked 'unsafe'.",
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
[
{
"queryName": "Allow Unsafe Lookups Enabled In Defaults",
"severity": "HIGH",
"line": 19
}
]

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"id": "d7dc9350-74bc-485b-8c85-fed22d276c43",
"queryName": "Communication over HTTP",
"queryName": "Communication Over HTTP In Defaults",
"severity": "MEDIUM",
"category": "Insecure Configurations",
"descriptionText": "Using HTTP URLs (without encryption) could lead to security vulnerabilities and risks",
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
[
{
"queryName": "Communication Over HTTP In Defaults",
"severity": "MEDIUM",
"line": 5
}
]
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"id": "c6473dae-8477-4119-88b7-b909b435ce7b",
"queryName": "Logging of Sensitive Data",
"queryName": "Logging of Sensitive Data In Defaults",
"severity": "LOW",
"category": "Best Practices",
"descriptionText": "To keep sensitive values out of logs, tasks that expose them need to be marked defining 'no_log' and setting to True",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
[
{
"queryName": "Logging of Sensitive Data",
"queryName": "Logging of Sensitive Data In Defaults",
"severity": "LOW",
"filename": "positive1.cfg",
"line": 1
},
{
"queryName": "Logging of Sensitive Data",
"queryName": "Logging of Sensitive Data In Defaults",
"severity": "LOW",
"filename": "positive2.cfg",
"line": 39
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"id": "404908b6-4954-4611-98f0-e8ceacdabcb1",
"queryName": "Privilege Escalation Using Become Plugin",
"queryName": "Privilege Escalation Using Become Plugin In Defaults",
"severity": "MEDIUM",
"category": "Access Control",
"descriptionText": "In order to perform an action as a different user with the become_user, 'become' must be defined and set to 'true'",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
[
{
"queryName": "Privilege Escalation Using Become Plugin",
"queryName": "Privilege Escalation Using Become Plugin In Defaults",
"severity": "MEDIUM",
"filename": "positive1.cfg",
"line": 10
},
{
"queryName": "Privilege Escalation Using Become Plugin",
"queryName": "Privilege Escalation Using Become Plugin In Defaults",
"severity": "MEDIUM",
"filename": "positive2.cfg",
"line": 12
Expand Down

0 comments on commit b7ff43f

Please sign in to comment.