If you are using Terraform to manage your infrastructure, DeepSource is here to help you write the terraform files efficiently, free from security issues.
DeepSource now supports continuous static analysis for Terraform files, detecting 30+ security issues.
To start analyzing your Terraform files, just enable the
terraform analyzer in your
.deepsource.toml file, and you are good to go.
By default, DeepSource analyzes all your terraform files ending with
version = 1 [[analyzers]] name = "terraform" enabled = true
Look at the docs for more details.
At the time of writing this, the analyzer detects 30+ security issues in your
Terraform files, which includes
GCP specific issues apart from the general ones. Here’s some of them to give you an idea:
General security issues:
defaultvalue of variable
AWS specific security issues:
S3 Bucketallows public access
SSLpolicy by a load balancer
GCP specific security issues:
AZURE specific security issues:
We’re super excited about this release, and are actively working on adding other issues to ensure best practices are followed in writing the terraform files. Head over to the docs or tell us what you think!