Files
kics-github-action/results.json
2021-10-15 17:32:14 +01:00

27008 lines
1.8 MiB

{
"kics_version": "development",
"files_scanned": 843,
"files_parsed": 843,
"files_failed_to_scan": 0,
"queries_total": 91,
"queries_failed_to_execute": 0,
"queries_failed_to_compute_similarity_id": 0,
"scan_id": "console",
"severity_counters": {
"HIGH": 0,
"INFO": 1628,
"LOW": 708,
"MEDIUM": 0,
"TRACE": 62
},
"total_counter": 2336,
"total_bom_resources": 62,
"start": "2021-10-12T12:59:43.666198+01:00",
"end": "2021-10-12T12:59:49.056688+01:00",
"paths": [
"assets/queries/terraform/aws"
],
"queries": [
{
"query_name": "ALB Deletion Protection Disabled",
"query_id": "afecd1f1-6378-4f7e-bb3b-60c35801fdd4",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lb#enable_deletion_protection",
"severity": "LOW",
"platform": "Terraform",
"category": "Insecure Configurations",
"description": "Application Load Balancer should have deletion protection enabled",
"description_id": "224b3c6f",
"files": [
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative1.tf",
"similarity_id": "6e41b4c14440fc42d084ec54de37649d7dff0731870ba949cd6e5a7308df0173",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_alb[enabled]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf",
"similarity_id": "0586b1fcf7fc544b156c7f766990df91d44b25e59e367f9847e0be38efae6ef9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[alb]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf",
"similarity_id": "00c7a5de0048d51284592f915eedcc9b4f3f0acde8c657d8622c9bc97a76ed12",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_alb[disabled_2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/negative.tf",
"similarity_id": "347945dbe47e4dd647bf7069eaef81d45d804976b3663d456e4e876bba2b68d1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_alb[foo33]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf",
"similarity_id": "8e2c4790ddcf078f5ee3ccda51f61eccef8540d1c248ab17c3fb5aafe0f80434",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_alb[disabled_1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf",
"similarity_id": "1020cc6e107aa3e0f06c7a62da1120481a3ab91e74de9370dc72ce9d5c6a5167",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[alb]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf",
"similarity_id": "9b8627cd2f542bfc8cd4c46ce61f9f8a3566cff28b186244cfc929ec8d9bbffa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[alb]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf",
"similarity_id": "79107a63984e85c1e602bf9b2bad95fe737e1f1b3e79d473213ef281f81f03f8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[positive4]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf",
"similarity_id": "37bc9fa516485cccd6089a02271256d8afcf2afcf3f8e17ea383631c7556c6f1",
"line": 28,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[test]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf",
"similarity_id": "79fe377af1d9a8099b871e93b737e0e49eddaff8f565431ce509e19d4b87d304",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "aws_lb[positive3].enable_deletion_protection",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is set to true",
"actual_value": "'enable_deletion_protection' is set to false"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive1.tf",
"similarity_id": "b5df7b7fa7f7822a7387fb9ee48544ffbe128e24c9871fc0a4a999477746d2cc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_alb[disabled_1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf",
"similarity_id": "f9548e390f291fa2aaf8fe8b9cb58e63ba54a949004008f87c5ee75eb8cb864d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[alb]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf",
"similarity_id": "e1a97baefce0eeb08fbb74630e5bed8f7773d733b83ced9d19b30a38436589e5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[test]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf",
"similarity_id": "ab2dbfcc0ec7097f3905f2971a280f85d22a09ac3fdf534a29069bf7e6f41ad9",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[disabled_2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf",
"similarity_id": "36f76cafe1b909883c7de8d12e50bc280c2b59e189891ec73d382000b8ae06ad",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[disabled_1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf",
"similarity_id": "5605a2534f408e017b591a2b5ca499cd089001f0f1d71dae13e970d309145cb9",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "aws_alb[positive1].enable_deletion_protection",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is set to true",
"actual_value": "'enable_deletion_protection' is set to false"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf",
"similarity_id": "f41a22332bc00c57fe53adeabed25c7f99b93d89251a1d6ce36a17f22677b273",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[test33]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf",
"similarity_id": "2e6c1ce04a1d0b42ebdc5020a6ce9b0ac90f37b5b6d72535e22c643cc97a5ec4",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[enabled]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf",
"similarity_id": "a749007a35221207e5f9c8e8a8166a636abf5e54f9370883f41044fa2cdd965d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[alb]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf",
"similarity_id": "e9445c6f8155c2dacf56f8747bd8feb08cf1addeb801a25e238412ba29e24840",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[alb]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf",
"similarity_id": "20ac402e382fa0888bae94571a65b0f05c9c721ed031b51eaa8f71c710063215",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[test3]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_is_not_integrated_with_waf/test/positive.tf",
"similarity_id": "e28effb6d1c26cd009d583dcb96405be6e9bc2f42aac2bb100d2997314f1b456",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_alb[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "7b1810d5e9ed391821c0fa2bc5aab8bdaa40ffc9ed1bd362ecd15da6c5446fcb",
"line": 49,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[test2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf",
"similarity_id": "637ffc6e1680617cc97ac2479450372317f6df5d5acb2df28ef4cab678f4c1ca",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_alb[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf",
"similarity_id": "df08dd37db81ade124c03a36e2b9d4e4eb54a748ad6e68b33b3dbf205df4b7b1",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "module[alb].enable_deletion_protection",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is set to true",
"actual_value": "'enable_deletion_protection' is set to false"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "1830dce5112123f8856e94cf507209143e25443676ec469084ddc37a8f2bce24",
"line": 49,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[test]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf",
"similarity_id": "6d3061d0d0de149f7e52bcc08629463415e3c0a86989ffe81369400188cf3372",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[disabled_2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf",
"similarity_id": "c79eae1b40a57e59fa0e322b919ccc70ea09bcc4422e32c29735aa095b6b6b19",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_alb[enabled]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf",
"similarity_id": "eafafcd9b805eb6442ceb40c1ae54e1e68223a9bc22d397b38a13e540bf46143",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[enabled]",
"search_line": 0,
"search_value": "",
"expected_value": "'enable_deletion_protection' is defined and set to true",
"actual_value": "'enable_deletion_protection' is undefined or null"
}
]
},
{
"query_name": "API Gateway Deployment Without API Gateway UsagePlan Associated",
"query_id": "b3a59b8e-94a3-403e-b6e2-527abaf12034",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_deployment",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "API Gateway Deployment should have API Gateway UsagePlan defined and associated.",
"description_id": "a5480b6e",
"files": [
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf",
"similarity_id": "315245822a4dc6f97239990f1a8fadee201edb066587086ba3d0ae1aa5e73b49",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_deployment[example3]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_deployment[example3] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_deployment[example3] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf",
"similarity_id": "e7cad90a71cb564c2a229023b511c18cb3a94117fdc350d3e8d90d129cd340a8",
"line": 38,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_deployment[api_gw_deploy]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_deployment[api_gw_deploy] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_deployment[api_gw_deploy] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf",
"similarity_id": "014887ac8a52789a764bbec5ff9c952c0c99622958512a84d85c2090a7c23e99",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_deployment[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_deployment[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_deployment[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf",
"similarity_id": "121e5015a86c3ebf9c6c8b0ce0ec2686edcbbf7b1ccfb6bbd7788ebbc0d433ef",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_deployment[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_deployment[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_deployment[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf",
"similarity_id": "0557c925f271b9ecb14693a38bd826d755479fcd9a54f20aaa04070c38b619aa",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_deployment[example5]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_deployment[example5] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_deployment[example5] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf",
"similarity_id": "fe046182e3c25d5bb59028a62d80d7bfa82f1f2f01334802556b4d4c48ef6405",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_deployment[examplee]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_deployment[examplee] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_deployment[examplee] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf",
"similarity_id": "801181d9fc5f41b964e09afb3af9f3f516cb0ffc5bd734ea02ef41bd3b58355c",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_deployment[example4]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_deployment[example4] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_deployment[example4] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
}
]
},
{
"query_name": "API Gateway Stage Without API Gateway UsagePlan Associated",
"query_id": "c999cf62-0920-40f8-8dda-0caccd66ed7e",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_stage",
"severity": "LOW",
"platform": "Terraform",
"category": "Resource Management",
"description": "API Gateway Stage should have API Gateway UsagePlan defined and associated.",
"description_id": "72d08d94",
"files": [
{
"file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf",
"similarity_id": "ba8fafdf15c4fbfc8194b4c709d01e767f5ec665ec35df243593b62b45007231",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf",
"similarity_id": "7290a4d8d2c7bed78dbea097027a0465cdb6f78bfeacc102bd2d10922ac8bbd1",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf",
"similarity_id": "30911dee2e97d890162bae4f3896b7eb7f7833a3b4fb9102f76ef6dcee10d743",
"line": 11,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[example0]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[example0] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[example0] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf",
"similarity_id": "d025d9988281a2f1f4e12c09e918f8c6f2197cfd3f4303c5f37b9f9fd8d4af7c",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf",
"similarity_id": "a17fa417702ebb855c29eac44ecf5dfe9f0a58878bf82f8402dbff64c721aca8",
"line": 72,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[api_gw_stage]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[api_gw_stage] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[api_gw_stage] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf",
"similarity_id": "ede6130eace2da0b1b478ba65c005386911acef1ef358a846e5b22b3d67a7b19",
"line": 25,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[example]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf",
"similarity_id": "e5fcbba9c9307caa16b33c2e174aff2163e6bfb4d9697eb0301d2c7816617324",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf",
"similarity_id": "9dcefcee24bda40bd556195645dd87e4b8a2d76c6b38ad55be3eae13433fa620",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[example000]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[example000] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[example000] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf",
"similarity_id": "3278c02e08e01be35d5bdd2e3759d263c62c828e34575336d975961f3acb93ee",
"line": 25,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[example]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[example] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[example] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf",
"similarity_id": "d2d56759b8a97d15cb9a54e80e02516c6cc1be6714fa63d00ac6e755d4a37355",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf",
"similarity_id": "6c8ecef8f3c058e048123f1a01981e31abf1b8b2785f08d6731b10cc8b8cc437",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[example0000]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[example0000] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[example0000] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf",
"similarity_id": "4177c00fe8e290d6685d5f059a2bbbffa018444d9f18cdd3e9767b109a0a4fa9",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[positive1] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[positive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf",
"similarity_id": "b574b6f19ca5a42f9d251f0ae4a047aca822bdd1058a53886a0a9c4dd9752395",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[negative1] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[negative1] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf",
"similarity_id": "364c3a493b69e6ef422f918abca0ecfecfdc8d2d2a4bb07dad11779e1277d37d",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[example00]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[example00] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[example00] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf",
"similarity_id": "82bf61396f5968348529fd295b861b8281cf657c2b9d3880b1bba2982902a1aa",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[postive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[postive1] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[postive1] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf",
"similarity_id": "fdb3ad0c037b1bf4d9e6b3b9c0331067d78cf75b3b917f7a6027fe5a7f4a2b15",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_stage[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[positive2] has a 'aws_api_gateway_usage_plan' resource associated. ",
"actual_value": "aws_api_gateway_stage[positive2] doesn't have a 'aws_api_gateway_usage_plan' resource associated."
}
]
},
{
"query_name": "Autoscaling Groups Supply Tags",
"query_id": "ba48df05-eaa1-4d64-905e-4a4b051e7587",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/autoscaling_group#tag-and-tags",
"severity": "LOW",
"platform": "Terraform",
"category": "Availability",
"description": "Autoscaling groups should supply tags to configurate",
"description_id": "83cb6386",
"files": [
{
"file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive2.tf",
"similarity_id": "4b64336cb86910fd3b0ec7df632b9c21325b4cc3cf09b79ed6109a9dc54fe697",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[asg]",
"search_line": 0,
"search_value": "",
"expected_value": "'tags' is defined and not null",
"actual_value": "'tags' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf",
"similarity_id": "e4eac97be633ce885a0622e2a8f446dc9c27bd961fdebafa0202475c3c2df8ac",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[bar]",
"search_line": 0,
"search_value": "",
"expected_value": "'tags' or 'tag' are defined and not null",
"actual_value": "'tags' and 'tag' are undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf",
"similarity_id": "a9f0a7cb5b3de45f09f331b99d7df70d4ad4984fc647de044421fac9b46ea121",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[bar3]",
"search_line": 0,
"search_value": "",
"expected_value": "'tags' or 'tag' are defined and not null",
"actual_value": "'tags' and 'tag' are undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf",
"similarity_id": "e3d2b17430bfcc7aa31ec8cddede4d099f60b4ce56c137c4a06c4b3157d0aacc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'tags' or 'tag' are defined and not null",
"actual_value": "'tags' and 'tag' are undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf",
"similarity_id": "855ccf9d37c241f1f932c3a9497082bec7de9e77618541262116e4dce4892f49",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'tags' or 'tag' are defined and not null",
"actual_value": "'tags' and 'tag' are undefined or null"
}
]
},
{
"query_name": "CDN Configuration Is Missing",
"query_id": "1bc367f6-901d-4870-ad0c-71d79762ef52",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution",
"severity": "LOW",
"platform": "Terraform",
"category": "Best Practices",
"description": "Content Delivery Network (CDN) service is used within an AWS account to secure and accelerate the delivery of websites. The use of a CDN can provide a layer of security between your origin content and the destination.",
"description_id": "1b311401",
"files": [
{
"file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf",
"similarity_id": "a50999b453c2a91e688f200ed03da738eaecf52b045e309fbd8362d9ad020f57",
"line": 11,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudfront_distribution[positive1].enabled",
"search_line": 0,
"search_value": "",
"expected_value": "resource.aws_cloudfront_distribution[positive1].enabled is set to 'true'",
"actual_value": "resource.aws_cloudfront_distribution[positive1].enabled is configured as 'false'"
},
{
"file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf",
"similarity_id": "19c7b053e95a18ffd075c07c51db2befd75a489bff933004a81ff386710ef96d",
"line": 61,
"issue_type": "MissingAttribute",
"search_key": "resource.aws_cloudfront_distribution[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "resource.aws_cloudfront_distribution[positive2].origin is defined",
"actual_value": "resource.aws_cloudfront_distribution[positive2].origin is not defined"
}
]
},
{
"query_name": "CloudTrail Log File Validation Disabled",
"query_id": "52ffcfa6-6c70-4ea6-8376-d828d3961669",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudtrail#enable_log_file_validation",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "CloudTrail log file validation should be enabled",
"description_id": "1d528dfd",
"files": [
{
"file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf",
"similarity_id": "a644ff00b637d969d67c1ff91dcd2180accff0bfe3e8857a5a3c25dcbf7711fd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive3].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf",
"similarity_id": "76336683b96b3742355aa571b6ca0cffe892c99f391d70bc92552d4f7c7fcc50",
"line": 60,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf",
"similarity_id": "61d53a9f6fedd7bed8f878030a1fda24e3a81cc70b86b7e88a28298e23cebb4f",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[foobar]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf",
"similarity_id": "c7fa60d2f6768a67312d4ebb3f9465c8d9ccccff513e840291b467b747e8c0a4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf",
"similarity_id": "8d9b7ccb5c82e7f9905af895b1fa86f25da01bb09ba3a9bc30033c6790e9689f",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[foobar]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf",
"similarity_id": "008058f43801fa2b8fa1b92a01cc24b355920d7957090072970c42e09a9d017b",
"line": 47,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[foobar]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[foobar].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf",
"similarity_id": "db916720db93863f94607917068ec869ac3b500271ea13f854ef32d977f7d1e8",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[example]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[example].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[example].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "ce483994d3ccef6e0ac93fdf809153723d388ce73e29fdb8f9d1fde7469fa0ad",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf",
"similarity_id": "fdd5821e0c98579b4cf5ee75faa7f5e434a6aaf61aa05a65b4b48090e2d2fd86",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf",
"similarity_id": "0011f0ca60acd3ebbc298f6f6104fc924841d9246018fdc9ac265262534f1f04",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "79e3be003184d4c0dc2ff15c32d9b826757c1b7645a286d844911749ba528718",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[negative2].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf",
"similarity_id": "b7abb2b55853ff94df0666bb3a67e22f1c8169c749044a3f2b65983d42c76341",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf",
"similarity_id": "75923477f39ba943d5f2649335e245bcfcf85d68630357379d21c9a79db36242",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf",
"similarity_id": "1aa5a74fd5e820cd5efdbaf5399c2d67e240e884ab74c98b9b570ac1f030f712",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf",
"similarity_id": "29f29b9ca0551f596f5a10c202b23d067a1a0f9cab337ea750005d97bc245eec",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf",
"similarity_id": "a670b0a5c796f9c50012b8971d72b52ce7ee766020e7752ef25b0eb561bfe57d",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[foobar2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "ee8ce3974034ba131e8ed0fccd9ac5b8c53b9bc60c5d62d8df65857f543fe769",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[example3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[example3].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[example3].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf",
"similarity_id": "db1b16c2d9f79c9c8d68042a82cf6e1872c5a29f6ab155482a9c1dcc3f25f848",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf",
"similarity_id": "d0fd62bcc627a4a265dbcf526a93ca11b6a1d60892512ee05dc633f99d4e405c",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[foobar2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[foobar2].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf",
"similarity_id": "5e3a274b03e3eb27e9faab53b36703bb57917e05b8695a4deffb06b162798f3f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[negative1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf",
"similarity_id": "15206ad120a03c8fd30ddb618bdbb98012dd6a71d949ecf1a073280d2ed3193b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf",
"similarity_id": "ff65a715f530ab65b9ebc3247755baf7b51ff16e7e5f44851bc8b1ec3a40e223",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_cloudtrail[positive2].enable_log_file_validation",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is true",
"actual_value": "'aws_cloudtrail[positive2].enable_log_file_validation' is false"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf",
"similarity_id": "df887b84fdea925c13acd9ae76de9f88cda905b713f4f9286e29e86cdd6a8216",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[example2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[example2].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[example2].enable_log_file_validation' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf",
"similarity_id": "6242d5ee925cfc828ac3814c0c30c3ece06bebebda18f581d0fe58b9fda73ce0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is set",
"actual_value": "'aws_cloudtrail[positive1].enable_log_file_validation' is undefined"
}
]
},
{
"query_name": "CloudWatch AWS Config Configuration Changes Alarm Missing",
"query_id": "5b8d7527-de8e-4114-b9dd-9d988f1f418f",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "Ensure a log metric filter and alarm exist for AWS Config configuration changes",
"description_id": "698457eb",
"files": [
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "28f87bb0f29a1c98757f28b377a63b8314b918e3e975eba584744032c95c2e57",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf",
"similarity_id": "2e076476ecf6a3f22f3403f73506d504a9aa9a53db3dcbe75e33baa57313543c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf",
"similarity_id": "59b3ec0f7fdd6a31c942cbca94e6a997dfe0e770b5db89bc742842a87d0030ae",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "074d53bb2102b9871082ade06d2c663285c0f6bb5105a81abeefa0140282df6f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf",
"similarity_id": "c94d127e3ed0c1572e0cf28a3cedf2b8fb012b324f9dcb93f3e255039c4caade",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf",
"similarity_id": "b62912d4a0d653b3859e256d083f82e889b2e98094fd55a3b76f6be718577c0f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf",
"similarity_id": "ccaa6439cd0fcc70434fc1484404cd2a18aa02df306f5ccaf71ebf8ff702f9b3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "9cd4244c2691de9b6ceadd71653340414d841446960942ea2ed470c136807e8d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf",
"similarity_id": "c6333e70a3f9835e5e9651674e5c1a800e6cc512d5e4c9fafe2ff0fbccfdd3a2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "ecefc086516cdce3a07e986022ad62b2df13a5e532fd75611d9dde322ba15908",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf",
"similarity_id": "b4ca7a986f97b9b166b0123d5ded78f3e475601365e5a049c061856d2142c413",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "b276336bdf94aa4eb10581351004ae6b00b74a1d0fd7545a16bda080e612f944",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf",
"similarity_id": "e412e90921de50cfb66b29448c6363e1e62d2ee0fdf27e1409f1e387b4365a81",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf",
"similarity_id": "65b4a94cbb3aa115a625e23a2f15ead1e443255c1aca3c2f69b59d6df5715343",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf",
"similarity_id": "a834e8872e49b3a752827b6f04ce83c4b87071401563c99fda0990bb99f92b90",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf",
"similarity_id": "0d226ae52afd4ce3df7f683f6bd3b23ef90690958379d349d277cac18f442943",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf",
"similarity_id": "44f5013ed83bd2ab95752d150a45c3611566646bf021fd9e07635557ff7f33fc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf",
"similarity_id": "a6269e470632414562ab4177408397cce637fc6702d293780458439ec7f54599",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf",
"similarity_id": "335cc2a7fcb18aefd2d8fb960bf5ad3a38f367499cbb74a6c0962095525fbc26",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf",
"similarity_id": "6ae20fa38ff7e1c97c2d046589a45c6b74c1e4cfd2e27feb4cab66204b930a60",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf",
"similarity_id": "a21f8539e1028b57564ab81ef706d0f757fd6668c6a2503c89b67d18cdb2a099",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf",
"similarity_id": "65a39bf06af3d685acef8c2b4b109951d483c63160ceb4b14ad591f18d2d6b6f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf",
"similarity_id": "043a223432dfa607862f178ee01b5de3523b883150f86c3201d48f06625557c3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf",
"similarity_id": "fcb8555af68319cd26d1cb7269597c11b88b767f61aec40540a8386a9c894061",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf",
"similarity_id": "7c1a73d47fe7dcca24abd8250612afc66acfa873198a6e085cebb2808c4ba52c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf",
"similarity_id": "5b5e7e1ce37cb5537749613c15002a89b5cf3afe32fc9e5c013009bb47e4b8ab",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf",
"similarity_id": "04e9b1ba138b3afb3a1b7957d5745cdff05d32800d951f884db8eb79d4d09193",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf",
"similarity_id": "55ccfdb69438e2f921f85d9574a2f1318cddca42240d17edc1598470342539f8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf",
"similarity_id": "7cb19bad2001702b2b3a74a1b88fc09380ca5872b07361f9392586a68c6ea32e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf",
"similarity_id": "da6c720072286d021cbe6aaa6a86d316971819c43193bb62f0c8b4373e5d4781",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf",
"similarity_id": "b93c9b9f92fd3a703e9cd883479625d8a96834b08fc422dd32e8aa3cb0366cfb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "7529218b0891ec78e6d2d0feed8a28804c6d7362af163818a104f8e9a385e497",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf",
"similarity_id": "74671108c5a4c16a44d5ddd213aac8335882d66e56fea9f5a7696474f8055c62",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "f12c8016108020ecab5441d6d6c57e5390f0dcc6b34d8e3450c247928f5b6063",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "2c740cc1300c105688774751c276fbd5b850c66fe6bbdb7a5b53c50a55852b76",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf",
"similarity_id": "b1ac557a63053a01dfe8b382280a37ca1f71de8d3f640fe82ce274c307a6c609",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "2f39af1c579386638e083768d08dc27669271bb77159056b5fd8c8e978197263",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf",
"similarity_id": "1fcc438f115fdcc4c4754acaaf3b8c2e3dc07287500dccb02ef95b71f4cd233d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf",
"similarity_id": "02b8f48a29d1c0e79e3a6089b74518dab3065d8bf653ae42a4c030c284029c59",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "b300a1b2d46e4fd672fa8e71a773e10cea6e61f6cba2a2a13690e04c2be3c563",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "f3e520e4560f6259264fa7d38501fc7cab4bf57ed620c9f8cc4686068ea5e4bd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf",
"similarity_id": "9081c8bef2daa3bf24ae285d9f4d95b3653b80569d293493a63aa23dc87048e6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf",
"similarity_id": "fa442d97d2facfbb9435046e640ace7af831b786f82eb492e22b8e6da169deb9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "7e1ed3f47b10346218be2a1dfbb39cf5898f221ebd5412ff339ea76dc0e80c3a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf",
"similarity_id": "b6d6912628dd64fda3d1ea8577682bc6d077b371854a23a42101eaef09b45b9c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf",
"similarity_id": "274df2558ff5ef7226542716f620e3178781b226ed625c035bdff8a951746f90",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "d8ae9645e2c534b4eaaf76fb7ea2af32775d088b36809660c963766c028bcf39",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "f8405e844341b177a1383ebe7b749235ca60b7f03794e34b1f736de35a7ab772",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "9a2adc925423e4ab36d70969ad0a2ca2f12594e9eba011334ae620cca52d6e4a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "0277550cfa8d9f99d9ce3ac56754cf18a58cebeb04279748df8de210d52c30cd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "ecc26d71ccc531303fbf652725b25fd84afbdb4b79f248d76ae147e5d8fc5003",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf",
"similarity_id": "88b2014ac2f47ac791682cf1c2ca53822d16f19ad6f3dc36661ec01eea55b05d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "4685abb28751888cd15122fa27ee1831636a7da404828faf024befac00e88966",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf",
"similarity_id": "a83c37218caccd906f54028f77f80f57c84e3230a390ac238a8a1661c9581677",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf",
"similarity_id": "42db9b5953ffd4ce0f43bba9ae43dc47554d7a3030d2df77a3bc68ea0fa9ce27",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf",
"similarity_id": "86180f0cd176e1fd3f1e75ac049556dac6016c46ff891fd6081fd0374bf00971",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf",
"similarity_id": "7752aa5a9968c1ad337779ea051b4a90c4e14b55f7d948d04ae2b97b6c29cece",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf",
"similarity_id": "8d9e5a04a5ba7f75c0b0ce8c5815fdcfe5af2dfe6472403d30fe85ba8ed41f6c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf",
"similarity_id": "049693902d84a83a657cb7e204806c9e88c5b57569283dc50648f0d6de07c39e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "55f260444f9b71bfb45f22c8c9d259360fae4cc2679ae7dcedf3d0d860dbb8d4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf",
"similarity_id": "1252ead1dc8b9b681b9ec987437bf5dcdf8d73b6621ad11de5276e782da8faf7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf",
"similarity_id": "647389548c331aea315d77f17a2ab165dda086d471d294e0e20165f9fba271cd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventSource = config.amazonaws.com) \u0026\u0026 (($.eventName=StopConfigurationRecorder)||($.eventName=DeleteDeliveryChannel)||($.eventName=PutDeliveryChannel)||($.eventName=PutConfigurationRecorder)) } or not associated with any aws_cloudwatch_metric_alarm"
}
]
},
{
"query_name": "CloudWatch Changes To NACL Alarm Missing",
"query_id": "0a8e8dc5-b6fc-44fc-b5a1-969ec950f9b0",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "Ensure a log metric filter and alarm exist for changes to NACL",
"description_id": "0a8e8dc5",
"files": [
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf",
"similarity_id": "6903debe27292f8b3c0a424a2597e9be6573dd2cd0aa36fa8f609d48912dbcba",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf",
"similarity_id": "485745ba95ec0a8997592fe4f47701ba55225e1b7b694763f2cdb2d9bf173bc5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf",
"similarity_id": "249352fc5abd4e080e58c75e6f86388079749c863e45a9ea977c7ee92af10668",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf",
"similarity_id": "d93c96fb13ae98878e434649c183d291d26423a361d1d358e2f49ad7795b058f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf",
"similarity_id": "65845737215fadc5dd2643d2e8948371b7357d5510a4277e5589df18adfb2f63",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "b92d35e9ded8e4d5ecad815f861f57d208830465e15785a40e449fbf7aa57c07",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf",
"similarity_id": "be76d95f00873a3b109046fb88cae8f4f93d356175cbb884fcf716e451cebfdd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf",
"similarity_id": "2307e0a5d574326cb23eb9511ccecc35ccdf134d402da6f0950cea9708f24937",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf",
"similarity_id": "94f4efaab306065c84eb1c7a9321d7d80254988f1bc7b40fa956e1dcbb9e8552",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf",
"similarity_id": "9ae953e7c2a5c4adc7b5ba35f232b0c71774fb74326a594516d16c6a31f5cc6c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf",
"similarity_id": "1433a773893e6eab9b5f3641245e35b9c2b48458d19a6cc184ce9fcc82f5a3a2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf",
"similarity_id": "9e157e89bfee691e474555ea313473faf0bd400f12c0a7b2c86a11404b83f8bb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf",
"similarity_id": "a844b32718ea690fdfd052a25fed490bd355e5aaf2e6cb1fefbbbf15eed09048",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf",
"similarity_id": "f9a50789122dfcce1819d1f826db0fd2de1f69ad922b4f01043658a63251a900",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "70b614d2064abcdc579b73ddd4c14539d241e7bd22f65fb2d7d66e3288dca931",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "6323b4c11ea7b1919b4f01d003c81635f415e17bca3be8fa8d4b89b419015f4d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf",
"similarity_id": "a7f7e4882e792cdfdbf05bddfb7e23ba51c4838d2b5c1cef1fc88c529b6fb76c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "159d125f26b67eb1859093536e003aa91b0942a199b17811fd5bb4ba66d9976e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "f8b527a9d9be588b6045d24ea1e2d204df7fad8d158f3d1942852784d9c7b571",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf",
"similarity_id": "71c4bd33bedaf8b90d98e1fd763d2a221285f1a3d8eae7e6ce80adf4edc62f0b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "7958aee25634b1b364c256b800df93bb8f912ceb42c9eb0fbef45f1749c504cd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "05f279e147a429dec1aec7efb2c3b71fcc24bb3533c178fbe5fdcc164cc3f451",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "b714c77fa2f094d9b788b0b01896ff7ef3bdba01611fbebb3b6b098c80b5beb3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf",
"similarity_id": "465558f068b5c835eb1f7dcc68bbe5260c4434c283d2ee29f02717d02f2c0c68",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf",
"similarity_id": "b281b765980341e64a53da3483b543a1257f16ea3781eb54f786acf9f0ce5805",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "98a798f9e4f69097fdb1f53a2a43e4cf2e259deef094f28faa4ae844b991134d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "2f55fa58ea005a436fbb461a9e29d93d8b48fc41b136dcb19e15f7445ea47363",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf",
"similarity_id": "3f65270c622b900fa56da691dc85ad8542053e3f450b0e5eec1afe073dafc38c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf",
"similarity_id": "037110ae7740689f8d70973200f808ce3b6df9138fb4704356ac1984a2cea84b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf",
"similarity_id": "652229c4fb678aa74cbbdf379ae864e5c9cac99dcd7debc1d7d6277cf64bcaa2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf",
"similarity_id": "7a2b1dfd6aaa24a3633d750fde31ecbb6f1f45b8fe0cd40d1843ef1338f5bf01",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf",
"similarity_id": "1ff9187a94b9eb1b57a641b399804ed95ec1fa100bc776de6040ff03d2de5ac3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "bf0ac8dcdf6ee7525f7acfee11b66dfdc31b2f59f58a96c26163afdeee105318",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "689986cc262ffd0b41b1ec127317ea1862b4e5712060e492e1343b9bb4b34d96",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf",
"similarity_id": "df1ffb23b4fd72edbb9abc58f3cb6a971c69fc9bb0e1feb8fb8d4e1c02c0aea1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "b5cc6bdc84f7c0120c4876348826cdcd0ed29f64d05251de9cbf7526c0086aab",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf",
"similarity_id": "12477a036b22810870095fcd2650c3ec463536f7a035caa7446580655379200e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf",
"similarity_id": "2672d93331e77df454da295ad66151d5d163fb9c2f9beb9c2ee68627a5ec9b78",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "291299fe4a86c7f6bc03ec8a12bfeff6f0394da259a33ff06649aa9522910897",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf",
"similarity_id": "0994a5bbfc9f71c539061df8cfb663bdbc26aff30ca4d96a85046fc47e680522",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "1075895c6e5ca3185b3e7eaa8f67d5b131ddb6021ba901fe4504745c8437eb28",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "5d5c03f6c5810ea5eddde285e6d214b3f96f76c7f6394fcc3c38edf1f00a4c73",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf",
"similarity_id": "d5be0cefcc8a54578269bcfa43552d3f786d58d0080173cac06f9cc04958ca5b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf",
"similarity_id": "c77a4887f7efc62d54e65bbde23162a68698576fc16307e8483c93eead158152",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf",
"similarity_id": "648d6c84aae55e0cf6e43c642c77c539ead27730668166dceca10c2e1b4d7f96",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf",
"similarity_id": "834310e001b17c9e3c20b118c28a0cb2af4c75680096b58f75f8a5acd319e517",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf",
"similarity_id": "dfdb1caff5bfcf063775e47bc3489fd5d44e1435739e5b587916560afdb72e3b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf",
"similarity_id": "dd66f94a42a0e11a06b28d64ef9bacd9ff2c2f4370e75c397aca9e9902a2e603",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf",
"similarity_id": "463fa47b5589756f95711cc14ace2b5bbe6735f986ab021434c2fd58388909b9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf",
"similarity_id": "b3bd5928e92f1a88fd2b79867da95120314d24de8ecd61d0bcac98d9a8914459",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf",
"similarity_id": "e9249b9bec36c56155b2a31240e8ce4da6a71583c0795cc43efc7e2f16bbb5b3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf",
"similarity_id": "291adb3d12d2527aa0ab1c6352aa4df64aa7bec549385fbf4eded296e1d7e398",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf",
"similarity_id": "9aa19a3c50addb7f6e3cd910aa7c0df76b9a95428de4502e189ee9cddd0bc00d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf",
"similarity_id": "6764112c98ed214c8fafa07c98f78e8361672d7d8d02e4d2278732cde894aa30",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf",
"similarity_id": "feb61d9212b82c4f0a8b26ce2a6732e338bfb30b7ae0958e219a415ab131cc9a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "ba017180f52f3205ac4a95a0dccb8d9ef7b9e91f465136c5020b92f87b67ae60",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "b2046312cd53cb96dbc6e4f03e68813cdb3e45033fc4396e71d50070f65418fe",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "ade7006ffbdddf8a86374dcd4f9e6ba5e6ada45d6680263004f9f458988a2d44",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf",
"similarity_id": "d672914d3abe349fae6f44fce8e3207696137b0ef7253fa26456793024f9a399",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "cc69dffa94d82474ed937d70bd84582846c69aea8eb156a0de3e836e4e90da58",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf",
"similarity_id": "91a5667d72ba097455047c306e8f1c3fc15aef712396476eb8027a2c12b481cc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf",
"similarity_id": "be22f6deefaa0648c755ac4d9df6b693552676b562cdfc0444577f717b75952d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateNetworkAcl) || ($.eventName = CreateNetworkAclEntry) || ($.eventName = DeleteNetworkAcl) || ($.eventName = DeleteNetworkAclEntry) || ($.eventName = ReplaceNetworkAclEntry) || ($.eventName = ReplaceNetworkAclAssociation) } or not associated with any aws_cloudwatch_metric_alarm"
}
]
},
{
"query_name": "CloudWatch Network Gateways Changes Alarm Missing",
"query_id": "6b6874fe-4c2f-4eea-8b90-7cceaa4a125e",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "Ensure a log metric filter and alarm exist for network gateways changes",
"description_id": "aa3e331d",
"files": [
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "3b23051ef50faeb0b44ffe056697c4f9534cfe36ee95a797a6dcfaaca11b65d3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "72eb98c2d2e83856ebc61685892701facaeaf3333a68601d8801d8798585300e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf",
"similarity_id": "336eeb58d45806d01927fa831e1e6438b6105a8d1205bfa2edf979b634e61be3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf",
"similarity_id": "6948b44813ff70d53b626d93cda53332f572be68cfcfd3ae54a863a7a49a0279",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf",
"similarity_id": "f156927b8f94fed6c5d07af2620a53c278441cb1c66e9862b687d8d40abb4285",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "b70fa2bf38bf27c514359c6c451b902be1a348f27688fa6953b6ac537050a793",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf",
"similarity_id": "58ac88b9422f86def946c1cce50cee5e86287d88a3ff0e00623dac784a3dbda2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf",
"similarity_id": "3b0d523a12cbceffaa4b2e933ed1dc37601a5c2c2ae5ab9af6f04667618a3a85",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "5f041053857cadb0774e8e8e1fa83001df3b204fd5227542925f3d666fd34ce7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "401d4110b6d1657a4db7bfd73f5b33be2cfac98f346667611ab3183e561e391a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf",
"similarity_id": "c93f9e28643027830395e95a6e1ec88523c65ae458de2b5d91d372e5f0fa398c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "5fc1cecfaa01a5ba4319bc40f74126209c5f6359c311598b59d4897eb035818f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf",
"similarity_id": "74e8c7a5f913805c1c3120cb8ca323b683ad3911acc7e136aca206ba88eb9d10",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "41a04c0d0892ac538682268f35850eca087895a6de3651b0b5c59b5abfbea6d1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf",
"similarity_id": "200a8bf334ca6bd48a2cb467bd12457dfe5293079963e67df042f3b562a23ee1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "c142860e6a4720f16956d9089f7335eeb38aff66e9909f2752b36ed7a5cca024",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf",
"similarity_id": "874bdfeb4d4c377caad144c24759530aeb9c868e05d9c0395c39cc29788abc21",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "dd840fdc51271dbc29fc6d639f68c8b917687726f23f5568ee9e5fe6830f4e82",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf",
"similarity_id": "728fbe9f99d91aadffd4a604026001f54e54afb2f8eb907182d5e5c9ae1801d3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "28be4d164a460322039b32ae22839e3e05239d3384eab3274c53e982b2ea642f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf",
"similarity_id": "bdc8427bfbcaf28d8056c0dde93ab3e61f271a93c1fd82286030764f37a11009",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "bb9e798bc79c461d373bf3495826e6d2cf3758a76e83b8d73452dffacced96b6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf",
"similarity_id": "632002730849b6dde19e1f95fcedae79fe2b446fd9fe6467fb992c23dad07e40",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf",
"similarity_id": "c1ac16b479874f7eb9750f0c4c03848f7dbb2fff563581a3650de74a533795e4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf",
"similarity_id": "ac42875da20a5dca32ca257af03c8ddd776bf2d40904f6a730220082933d3f68",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf",
"similarity_id": "d447febd06bd32d027b3116466b5e41f4d26975a305b0a8d91afd0ae3eeb10f5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf",
"similarity_id": "09f83dc75b82b907d540ba959a3241d2cdc5a9609f59fd95c85d1cb49c4ceaa1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf",
"similarity_id": "42a0056bf2810b9f2f23926da45240d646f39dc848e218169fe3554368d36e1f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf",
"similarity_id": "7cbd47b5e6bac6df1e7cd8aa2556dc977381dea6c222cafa19f28f96b0694944",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "910ca628294f24f35e935b83e45a9bed21d8dc0df1c648688147f2d5096d63d2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf",
"similarity_id": "385f84c9a828eefb9866de2d4ba6c159e2694ed1550a709b05270aa89d9e8d77",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf",
"similarity_id": "fcc6c07f8ad7d0d415d6d37c584bc0c1857c4b92e2f1f8d90019736b86042a21",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "665038c4b61988f3c75cb397c06946d787823eff54afa9247e2a87e4d790479f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf",
"similarity_id": "8fa4184becce81c1a8712a8424fccbb2209cc32c499b0760be24ab6b7bc36c8b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf",
"similarity_id": "b57e7f711e5288c7e68bb748f25ed7ee1c18dad137ddc4700276fbbae4d9509c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf",
"similarity_id": "c1dacad7a3b1e22ae90cee4a9acb7b6200d3dda20aded774a0cae23b4cc2c6b0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "c9133dba00e783e02621aab9ae721e38c5e2feaa5d023505807b690a8f78738f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "951ecb0bcb86b80de8e2535813e4060a14279914f3d789b4249dc1c569d62f67",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "b945f43cfa089d8ad757d1fc3df7994c9a14023c81e5675df6399276f1e73419",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf",
"similarity_id": "85f0cbca7d629baf95da3463a31d11dfa3da24ab7e3899192082661db11cdc48",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf",
"similarity_id": "65611ed109b8c52fed5f6ab3c242be0dd510c9fa8a8540ea8c5c7c1c465810ec",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf",
"similarity_id": "f8cec98b168eecb15f2d691010096a785e33ce6a52dc8ff678a26054b47a59c9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf",
"similarity_id": "edabe700b3bad1be302d6fd547c8f137d44947a8030c21d8b83f88c9a9427997",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf",
"similarity_id": "c2f89b882f00d3a20fe3181e881758dbdcb5ddd94a4b5f2db2e83542b992b55c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf",
"similarity_id": "b44d3211e8ac140ad48b30f1406a07c08f6d5288793756d35fcadf2f8e9fb4f9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf",
"similarity_id": "e827f68c19ff9a19243d5f79dce8781505fc34232c31f6eca43071bf4a39aca2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf",
"similarity_id": "5294b0970d4ee5046af4bba0608fb620c24a593c168205fdda84100c6980a7d0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf",
"similarity_id": "869bb74e042641698a9e7df1675f5903207e1d588ee5babafa72a573e07a9516",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf",
"similarity_id": "4a53fcad0c85593ef2bfbe82526e4e172307ea6be50bea5f247f0a6da6f73973",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "6f3127d45094652a171a0cbf10819d296645397d4b641f57fd5535920c365408",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf",
"similarity_id": "e5cf9d34b2f053c7a473a6a9fba41d29f512a46e70020b5447558ca25e911851",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf",
"similarity_id": "e1e179f493fbfd9c7017ef570dd253f1f8fe9336962af467a925ba875b1e3075",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf",
"similarity_id": "5dcb6d07e329415a468aed124837a2bc32033b9a0d0ecf204d41788dcae893ec",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf",
"similarity_id": "a72df7df02e361991c3a2e11969dc6e1aac724bcd165e201c13be1f563171596",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "36e1ba47ebd74af7a70aae8b49f7afb2702b9d1159e394fc8db8d58d521b4b59",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf",
"similarity_id": "84a55b5f1ca8ff66610cf824cb204d5e23484c0166152fc60df88f7674da131f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "ad248dd8fc79b68eaa1ab978d53ddb62242a937fb0a91d57a5365a2468a97d83",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf",
"similarity_id": "b7a4fa2b37836d1d5a6bc6406e4ead9f195fc71a15e25af3e36d209c023d4de2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf",
"similarity_id": "66bf5935a275d3549a384506e7907a773410fb137ed7a99746c048a889e8ef0d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf",
"similarity_id": "b11a7784b2e4e061be0bc6bf6d010fee5af6f0834d07e2dfc0c6fa8a18763d42",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf",
"similarity_id": "4270ec6885597c3b4eaa91a0e1718b92a380c2be79d674745d04bed83737a536",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "264d50985cfee37b425d82f87e07d904a6f0df08fbfca0f1fd2ac4173d3918c5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateTrail) || ($.eventName = UpdateTrail) || ($.eventName = DeleteTrail) || ($.eventName = StartLogging) || ($.eventName = StopLogging) } or not associated with any aws_cloudwatch_metric_alarm"
}
]
},
{
"query_name": "CloudWatch Route Table Changes Alarm Missing",
"query_id": "2285e608-ddbc-47f3-ba54-ce7121e31216",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "Ensure a log metric filter and alarm exist for route table changes",
"description_id": "de601959",
"files": [
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf",
"similarity_id": "5f4de854b65c2f67683eaac8f6780fa56fb102c267982ce4280f2c30a7910c89",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf",
"similarity_id": "3fc8da94a2be9d30ca3cb2f03a6451d5523aaa373521d041e81b29c1889168d1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "8d5792151098a66a1aa429d7ad4a3f69a7d531f30319a36de2acd80d22b6ba03",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "9b6417e4e20eacd7ef4ca63399721bcfcb618825881856e250cf1761294ce887",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf",
"similarity_id": "744004275ac12a397e73ad98b64a5cd8c3b9ff618d9a1d4271225e8d02af2cd6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf",
"similarity_id": "9010c5d88f95cf61813737a6be3c2343ec1f8e9312edb0fa5e251c5274660ead",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "fcca10ec92cb5db4284e2ec27e6d37a41193111579754c5b369531c563fd8f86",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf",
"similarity_id": "dc2ec4c61a39af10312fa4204c06967c8752eb128e0a7efd34ea8eee8b84af6d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "e85ee6b2c7910d2b1e16daef14afd4327a9e7c227f5cf692b59cede6b8e3bb45",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "4408b8fe65e29d894f70352519bcbec360cb750aca4c70480be652167ebc4a75",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf",
"similarity_id": "299cfb68d22bef4f83c848a7a4b94304b55a164b3ff29d3bb68a16de33586c6e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf",
"similarity_id": "f3f91fa8fbfd3392008c6862290df9f83c645e81667dc99ffb6195f78ac2ebe0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "818879350d986f73b41becddc585d19bc13b2f6fb78a2997d81c7ba2bcf252d1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf",
"similarity_id": "ce09dc668248c96186d24abf7905f43e53e0852feb4cd52ca5577d9a72713c84",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf",
"similarity_id": "fbff85124c847bf9a5a6cfb847ac2a2cdcee5a7e825e245479504d18d3bf526c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf",
"similarity_id": "8768dfa6fd9811f173cfb1db02dd8dfbf1fe6b48af944d6b72f6766fb25f1ecb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf",
"similarity_id": "408fbeb6c77dfa85b16efc3671db86f145a24c09266370a0148738515768cd18",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf",
"similarity_id": "43479d6fea094c3a706b398ec57d24ac7fdde35bb06a69e762a4822ae4649559",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf",
"similarity_id": "a5154b5e8653743c074ead09516866dcde8e4799ea6cbc44b3d5a2b0057be7ae",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf",
"similarity_id": "a898a7ef8fa71f4da5408b8ad7c78af82528fdbb5c1d44e9d6decdf686bfe102",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf",
"similarity_id": "bb67d5d84aab9dafa4b197421386056f13c14b4e6f329b52866157eff061e52d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf",
"similarity_id": "382a860570bc6cba4f8eb326c4046c1477bb1708c31afa90afdd32c2a99571fa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "c51474f8a7f6853d09b919fc90a88d48fb8b23def94f563c306623f043af7f54",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "09a16093c3109ee2cff2c98b289325cd8036fb8fc2602c21b1d7bd761fd97550",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "68b9a7df12ce98bb30c54a92eab0424eec55074c704d5d6de565dfbed90f52a2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf",
"similarity_id": "d573532eb89d2ddf8a48a7f221f7dac0e5ac26264a33a31f7631152c4c593abf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "3f9dae31110032114c585de5b64363a1c91afa6fec91f56e4ae8c2ea7b444c16",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf",
"similarity_id": "8fe37bf227ce3525cd879f89a31a02ea131a25d682b9659205dc0da19992001a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf",
"similarity_id": "1346d996ef997a03fbab68e90c6b3a56a324e52af6898509c4fd478888f2752e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf",
"similarity_id": "7521c790f8078a7cb377623e783f103d392dfa5fc911e066f989f7ca56ec1c4b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "782615d3c12204944dd01793feb71678fcf038a50d61382f0039be4a0a5a8faa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf",
"similarity_id": "58f395815f35e5edeebe7c8ad1bcbcb96a7ad1b43e0805e04f047510f6ebb95c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf",
"similarity_id": "54cb927716e2e78f8abe277f1b63e1f261a3b53096935b1394aa5e062af28a90",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf",
"similarity_id": "7f2d6e125af065b98c1706512f9592821638c70f7f3193dd45e83d5c58429bd3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf",
"similarity_id": "bfc011b73cba3e2415398c442629aeeb3feb435e7757e27d72a24ca43ab56b80",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "85807e5bd8ae70da946d69b52883008be232c84536f9ba7abae56a35b214152c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf",
"similarity_id": "4a824d05364ddcfffb9f1519ef230759527e14564a9364f1f95d8957ebc893d1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf",
"similarity_id": "8304bb77d73cb94b7dab02387d5f72a42d396a0ea3810b72124dd3e1ea6ad816",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf",
"similarity_id": "8a5abde40e2c5082485b9aa07bf9790d7bfc79574fafdd933c19722520cf9522",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf",
"similarity_id": "42dbe9c5904dbb08473cd0e66b2c31e3e4efd2aa24f78751eb5f38d9ad46ec74",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf",
"similarity_id": "274c213fe5ba284dfe630b901b949ffbc3f5e57c025dd608da1e5f11a47a72ef",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf",
"similarity_id": "b6dcb9d5dedf19bdaff7106a5b11c0a2a13afb11240e32247d28afc5818939cb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "3e35a47d4d4d42ff76ea022597476a247967de21f9059c90d00d3e43bd6992be",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "18c17b09f2aea09de7ab2490d8276d36cae7e80f12f7dc248ca1266265662652",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "0dc872dd2c1e46d3532c5031ed8bfb552987ea3001b8e9ade07d726cd00fc26b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf",
"similarity_id": "b478f7cc1cfb08f95ff8b2248e9f0072844fcb876ee7f7cd8a452c7f13fde6b0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "d418fd73f9e54cd84b5a3861e394348803c5d41935952217d825b9b3beac632e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "24ec9eb2d1b4d2ffb0d4bff6e140b603321fccd840b471ca893b98f2323cd7e3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf",
"similarity_id": "c31cd39b7fe08018896cea9dd4abd72fd25f1f10102cd02795827958f562b394",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "9a7a046f057673c9ee9d61cffc4082d8f5f2880b233ebabe0f73b4fc1d746842",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf",
"similarity_id": "fbd3e216c154ed0b7d4ef71c6ce0f83fcb9d468c44fc32e61252dbd1cc8a0bdb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf",
"similarity_id": "ddcb2be72c6172120455bae21d1a2df73c56337aacd35829917da6351b4b416d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf",
"similarity_id": "7d6b5e8b4c7205adb3debafafbe424a43664e9270d98b2333d91d50cc357161d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf",
"similarity_id": "be7e0430dd9d7d8cda1fd68465f958c6fa08f92cc543c60c506ed98c1ae93806",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf",
"similarity_id": "4e8ac4f969157ba544337ae63db2b05c54ae32f709aacf4ab2e4c84dc79fc542",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf",
"similarity_id": "a2845656a46d520d08f05cca7d4e18edf5122da36d648e7f26562f48fb6d1d49",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf",
"similarity_id": "c8d228540fd790bc85d4631b3fad2d576112bd40856901e80487aeaeb6b3c4ce",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf",
"similarity_id": "16ff25fe1c0d12c809b2513f66e868295448666c1998aa44a5e288b16578e77d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf",
"similarity_id": "35b04d8a9f78ff67b42b747ee870db727dac015805c7b4f6e6bc730d09731321",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "9b7d2bdcc84f0d91ee7e17a1631e4282954f1e92381283b7806bfcd120bd80a3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "08bdd5f12695ad3fa4c759e50f952c0264ef5a264f807f8a01d730b8b061fbb1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf",
"similarity_id": "9c8ba3055a2aa1d520fd5dc051b959e8d4451b078fc05e8b10a52bcc1c1f9cc4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateRoute) || ($.eventName = CreateRouteTable) || ($.eventName = ReplaceRoute) || ($.eventName = ReplaceRouteTableAssociation) || ($.eventName = DeleteRouteTable) || ($.eventName = DeleteRoute) || ($.eventName = DisassociateRouteTable) } or not associated with any aws_cloudwatch_metric_alarm"
}
]
},
{
"query_name": "CloudWatch VPC Changes Alarm Missing",
"query_id": "9d0d4512-1959-43a2-a17f-72360ff06d1b",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_metric_filter#pattern",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "Ensure a log metric filter and alarm exist for VPC changes",
"description_id": "6159556d",
"files": [
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "f78c4387e5a3d3c800b90bb179938fa2a00a902a2b6d141629d6710a1a15a3c5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "3eb6be622cd81951dd69546d846297283a8048094af0c466a96999e4268dd310",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf",
"similarity_id": "9b12d1e66bc898859bd8d6ca5f91ce8d4c180f298b59708c4a0b90219c565d15",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf",
"similarity_id": "93929468076cef9bc2dd1f31dfcf1fcf4407a88c1e2b5b09e9257ef60e9529a1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "aabf760db73489e89f5a362d649bbdaafd55c508c2d61bfcdde07a18da5d6c01",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf",
"similarity_id": "fc1773e959a8190b2cd1750a833864aa436600d8c0805ee124d481e7c80ff8ca",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf",
"similarity_id": "235ef3c222b16c81d2f1a5b501b998f69d3e8f8e744e828eb58d97c295e52d01",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf",
"similarity_id": "71eb4314bc802ecd15f9a58b153e157bb2fe946c263a17a85d5049104aa80ed2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "8075e728d058c0f7f98cb65180beef6636fb788339c58b9699de5c2b76b89705",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf",
"similarity_id": "e57d99f09101aa8733a3fcf31c3238c3ac965e13e60c218c808c9bfecd78066b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf",
"similarity_id": "62b3b1f39ef150054e8576d5acb9529b1fdecc921a0533c2d4fdfb1a90b1e3f3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "f7f31cd7837eb069c7840749615ce89c4c72a8b3bd7c81a7f3b570abdd91a3aa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "41e1a5a2b98d81369f7266fa736ac8cc4fe4a1f0db99ee2cfa9664eced06df39",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf",
"similarity_id": "43da36605491c399f3d009e25bf77db4572ba20c84825b0b296bbe145f8d6d3b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf",
"similarity_id": "ca4fb6a5313179fad4fd8afd7a7f467a16f4294ad86b47d17aec972127406788",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf",
"similarity_id": "30a647a4997f43851b5e73006547a61a7df8f601850feb1e2812ddf23c498acb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf",
"similarity_id": "1f1fdf2736d9401518c6705556d366a07ecff33e4d220715dd1a1017084ee8cf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf",
"similarity_id": "d87dff25ea446205eff3bce27baa6083ba82d8a7c283ae9c7aff4f0c15ab0382",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf",
"similarity_id": "2d8cb2554affefc7fadaedc282082eb5e12fb635c0dafcb59604355f4e74374a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "f5495de9230c5ad8adccfa79a3f05b27904720b95d2f92a451d356ef856bd5b9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf",
"similarity_id": "b2dc1cadcc721c30bdd3bd331105f6f10b58177a8dc0cc5a6d3ebe497468aa0e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "8bdea07bfec18400f9f5606ff8c51d4e5205d43cd92341a8c67098d6053d0eda",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf",
"similarity_id": "ed47ae20c9b65e049849d6de52d8c98eed9e56cfd5d2543c30ad8fb1d9adb59a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf",
"similarity_id": "ed19fd4ba86ee48e3e331b7c7a84a32c69b3c066e89ce86a55e7c2d9ea1a48b7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf",
"similarity_id": "3c6a380b65379e454579905cb146839aec504dc65851ca38e0ee4f28a5682403",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf",
"similarity_id": "8a11c75c62da0b3e476b15fa285b6e9ab0ab15d7c09ea87c3e8e917c48fe4974",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf",
"similarity_id": "1677ff343f734c85312f5271b3b458f8ab35cb5c180cfae65b0a715c7d657b74",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf",
"similarity_id": "82bd442524d21326497c31080dfec42cd908fb679e3e4f446ed3b46c07c6ca43",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "5035d36d56444f548960427a10a0b8e19ef36d58c643d75ec907ad4ae0bce75b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf",
"similarity_id": "154d640130fa237b2a736372e9e435563e38420c126b43274ed973dcbe8495c0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf",
"similarity_id": "72df2ec0c46e40447b2d415f559521b078753f15a77d322688d24c05583810d7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "f8c4b0583d63bb7e1003c39946bb1dee502782d2234c4ebe636784513c2a439a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "0b9cb397e700c0bae275fd6cc0e3a07ebc180761bdf245eeef8d8da348b5519a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "b9ce2007d1ef3f76125e7a6e1fa34712e959a18be2f616089801cc0223c9a33a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf",
"similarity_id": "771c92742ecb061b7622dd5a00e156b5336339276bc0a28944e4cffe6328f9ae",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf",
"similarity_id": "abe8f41d49fac229bdf379fad6145ba95a8ab80a6a841c63e36633d23587c0e5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf",
"similarity_id": "19104bd661e8e1a4be741f6db3c057c4d105929dd01d6e652f481af71ba29972",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf",
"similarity_id": "98d62797501e521825edd8fd730c8bb014cb23d6c10ef0e93ff1e9ea518e2324",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf",
"similarity_id": "68cc9c5e7d311b50531816623bfc2ff99d5e1cda0df1ddee7c3ebc19a73c4cdc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf",
"similarity_id": "7a1ec01d5ad2f9c26989664f0dbbc6d0995a015d78192e568f29265eabd8a0e4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "bb5bccf311faeb93a7231f345e83f4a8cbeaa9a502bf5fe09a68520dfdb941cd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf",
"similarity_id": "d3ff8a30e1a04eebef8b36665c016818c403661f1f450fd89d4af4f030179826",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf",
"similarity_id": "3ed651176f008e3fcfcc3b0b44475b6162818db767d56f9757a745a78553d0ac",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf",
"similarity_id": "6921930607adf03a8fb84dafaa23cf6e4f01b644538b419d56f4be6da4499e61",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf",
"similarity_id": "5f63a8330663349641ae2ba4717ff116c26798b2c2099f2e2a6a3c30f3445cb0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf",
"similarity_id": "ea9794bc190133c33f31e2961690fa5369a79e9c98693924f419682d2416d10a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf",
"similarity_id": "f8409fef601d328265f9c8595d78f3697966b327198543e1dfe74e564f0f09da",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf",
"similarity_id": "4de7ec03f90a1a0ab5c4dc30fca41900429e65318542032631370079069da1b9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "4d3548f002c256cb97d6edbcce6c838f53c1c0b959fb32f682a7a262a9e3f837",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf",
"similarity_id": "e59fbbaa754ac18e15835af9cc0f983ca3ad6231f9737794f38e8902179c9dc4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "856cd1946e9fffd710aa6544894cf316e7ba68ffe28474326674df86862d18e8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf",
"similarity_id": "f02c446f87b5dcb41cfdae80cbad8a1002a652a235976efedb06811c07e4f711",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "28b6b122ca98316681a2ca6434b10b82a3fab327214faa7140426637adf89443",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "f247aa47069ccfe50fce9945e4efa95a157e8c3cf087612ee11458c0a9ddf49d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf",
"similarity_id": "933ae9755689363c0ac942297991008be76f532c4f8d67e4514deac1ebf6815c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf",
"similarity_id": "d9ea1dbad6228d3ff28802bb4c4befd739ff5bb6b224200420201fb77746777c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf",
"similarity_id": "307cbc80158aedd51634508b0b9f661610131d2ccf5c1621e22951fc3ea2c3d3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf",
"similarity_id": "0c845d82315f1b992b49ff4940d80377bc165f2c19073e459b9242e532e7b9ba",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "3809462c9f6aa7145329e83e7ae4660c86181907e963802f4762ef092f001450",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "84f8c06f130b93e09dd4785ae74f25512999582d1781a3551da76ba32df96c21",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf",
"similarity_id": "c5e252fc71a3990d7f0bc27b8cba855f26a20389fbf0f5890088d66d69c4b2cb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "017ab77d147cfe88489aa58ae9a12e14fc69176d5347d483c9f5c3dd2f2cf29c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "resource",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_metric_filter should have pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } and be associated an aws_cloudwatch_metric_alarm",
"actual_value": "aws_cloudwatch_log_metric_filter not filtering pattern { ($.eventName = CreateVpc) || ($.eventName = DeleteVpc) || ($.eventName = ModifyVpcAttribute) || ($.eventName = AcceptVpcPeeringConnection) || ($.eventName = CreateVpcPeeringConnection) || ($.eventName = DeleteVpcPeeringConnection) || ($.eventName = RejectVpcPeeringConnection) || ($.eventName = AttachClassicLinkVpc) || ($.eventName = DetachClassicLinkVpc) || ($.eventName = DisableVpcClassicLink) || ($.eventName = EnableVpcClassicLink) } or not associated with any aws_cloudwatch_metric_alarm"
}
]
},
{
"query_name": "Cloudfront Without WAF",
"query_id": "1419b4c6-6d5c-4534-9cf6-6a5266085333",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution",
"severity": "LOW",
"platform": "Terraform",
"category": "Networking and Firewall",
"description": "All AWS CloudFront distributions should be integrated with the Web Application Firewall (AWS WAF) service",
"description_id": "8fa5ef1b",
"files": [
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "614ba989c920734697749e1246a49e9b09d9db8eaaead0134c48035869e6fced",
"line": 47,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive3].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf",
"similarity_id": "74e5b1ac6610157f9753860776e3f2bb26aae3d70ffebd5c978f7409c412dc30",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[negative1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf",
"similarity_id": "8fd5d3f1e64c52c665b91ce0ad5c24b1c2d45cc2f59e6689228e64bb22e9a50a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf",
"similarity_id": "e61ce49e54b2e99fff2e4d13dec99fbe9f0119c03c3bc1bb122f225e5a02ba16",
"line": 47,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[negative2].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf",
"similarity_id": "94ce01e7edb2ddddd7727bd1e8b7a4e8d026685da1e2fcb525c4b77eacd2433a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf",
"similarity_id": "637892cd770753a39b05f680e94569adb73dd3880e475c7534cc35ddb4413238",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf",
"similarity_id": "11112b047d2b794a69d3d92b67d95448f58c3ee5ef592304d70eac0f70bea1cf",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[negative1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_waf/test/positive.tf",
"similarity_id": "e54b8771b654e3506c1649c60d713aeaeb0cb20d50dc8f79cdbfa23f647436b1",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf",
"similarity_id": "3c97a44d4372669f0bb1ade1e55e160643edcc4544c26a6e3baf6cfb0708c45a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[negative1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "0ed44be96870c83d8f3ff83f0ed56b2cb50a221cf7383abc70b6f41a7ee121f1",
"line": 93,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive4].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "f69b0a30cb7cd2aa05cf24afba01584fdd00ea4d6d83b9123e7590b861bb8ff7",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive2].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf",
"similarity_id": "decdc872d4373042167414f3eb04e440954c03da7a00298ce1ee45d639f5e943",
"line": 61,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive2].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf",
"similarity_id": "dab7339ffcedf08d0a9f9c035892fb47e421ff6a49ff842ea019c403eb76c012",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[negative1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf",
"similarity_id": "2890871bf4c747cfe2a40230381fd3fc41f94e714278da51418138604a2dbad3",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf",
"similarity_id": "b57fcbc3947500adb08854118b601a4fd53312e5bf71d4f3ab5ab04f9e406970",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[negative2].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "c24f3424dcf5440647d32ca99826c718099f0387d6df2a9e5a9b2e585407025e",
"line": 52,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive3].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "3a1fea1ab92c64433b9744422188808531d5d557758d5c3104ea89a1cd6a6efb",
"line": 108,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive5].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "0b651b88654cdeb77c694c5d866fbcfd70e486fc7790e1373c76aa5032205ecf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf",
"similarity_id": "651aaca58a1616f445eadc407753e6f5ee3234622043dbc2909e4d87aafbf1ee",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive2].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "ea2436a00b727f768b593c8066f78f12ec11ca02aa507a9cccf5a4d51104264b",
"line": 24,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive2].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf",
"similarity_id": "89b11af93e7499b0fdef7ab3b7dc499646c39536dd9ba00131fa1cc95626b97a",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[negative1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf",
"similarity_id": "ee07c0db46cda988efc438b430114a881c47629ef376a0050bf7e86104641e57",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[negative1].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "c197cc682669f747680473fc43f47c02634c6f4b04bfde2ed97fd9dd30d7de15",
"line": 80,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[positive4].web_acl_id",
"search_line": 0,
"search_value": "",
"expected_value": "'web_acl_id' exists",
"actual_value": "'web_acl_id' is missing"
}
]
},
{
"query_name": "DocDB Logging Is Disabled",
"query_id": "56f6a008-1b14-4af4-b9b2-ab7cf7e27641",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/docdb_cluster#enabled_cloudwatch_logs_exports",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "DocDB logging should be enabled",
"description_id": "7a864a61",
"files": [
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf",
"similarity_id": "8f12796b960e04e4f65cf18cf8cc84471173946efac2720160c616a69e74910e",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "874f5afbad57a39b95efd136528556452f0f9dbb9958976dcdc2a67a884f4723",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf",
"similarity_id": "45a315e81ffcef96e753ab25c26e9683775bf58e89fbfe041d4a2ace5bfeabd1",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_docdb_cluster[{{positive3}}].enabled_cloudwatch_logs_exports",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: audit"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf",
"similarity_id": "98893f97db03b6aad45ffa7ae146dad1a7351000186f08255c2461ccb17c40b9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf",
"similarity_id": "61cb676a01e8f49da419c2dcc14c68da0bbc4f4bcaa5bb6ddf0f9a281c7d0977",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf",
"similarity_id": "859e9b8b1bb4442c840d58a5f63358a5cc363ec4dd44f99b377e99e99f60601b",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_docdb_cluster[{{positive2}}].enabled_cloudwatch_logs_exports",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is empty"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf",
"similarity_id": "2e78978fbab4c93daa78087d6e937893d52cac0c3c626db8dcb10dbfd4a244b8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf",
"similarity_id": "8ecbd41282330a2ab81733ee362b72448ce57bd6cc3d0e4236fc03505f96ba4c",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{test22}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "756b22ceb308d139e2080fa707269acd4e4b9a90219039a8254d47722018c707",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf",
"similarity_id": "bc3f1b2c18ca435da800633338d7d4cb48a7e4ef20c9fdfbb4aef26b71322fa4",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_docdb_cluster[{{positive4}}].enabled_cloudwatch_logs_exports",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports should have all following values: profiler, audit",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports has the following missing values: profiler"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf",
"similarity_id": "38b3732e02cd499832a6b29818dae2aa145c4ccfa32321925deec5ff43495b62",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is defined",
"actual_value": "aws_docdb_cluster.enabled_cloudwatch_logs_exports is undefined"
}
]
},
{
"query_name": "EC2 Instance Using API Keys",
"query_id": "0b93729a-d882-4803-bdc3-ac429a21f158",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#iam_instance_profile",
"severity": "LOW",
"platform": "Terraform",
"category": "Access Control",
"description": "EC2 instances should use roles to be granted access to other AWS services",
"description_id": "ffd8ce80",
"files": [
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf",
"similarity_id": "3b9048ec403ca5568afcd7009c62f7818c33de5e3c54bbbc22ebe70b03008213",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "aws_instance[positive9].provisioner",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive9].provisioner.remote-exec is being used to configure AWS API keys",
"actual_value": "aws_instance[positive9] should be using iam_instance_profile to assign a role with permissions"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf",
"similarity_id": "1d31d8fd477624e1b2bec35b5f2dbdb2e0a2952d6932d97c9e5accc7e1dc6ac6",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[positive4]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive4] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "aws_instance[positive4].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf",
"similarity_id": "8b960cbb8314ac6223873176945424304c4bdf8895a46b3c6ed31bc27e20c582",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[negative1] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "aws_instance[negative1].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf",
"similarity_id": "217c237e4fedb4f26901ac634a77fa3f5a038f77e281e20262c4227a375f5246",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[positive5]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive5] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "aws_instance[positive5].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf",
"similarity_id": "b25dc52221b54a4d444722c6c1426ea2600b883e3a8902d2103b0ad67cd7fb39",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf",
"similarity_id": "f0b088791ecd7665268128f96ce073fe3bf5770caf641d632f5a919cd72bbaae",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive3] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "aws_instance[positive3].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf",
"similarity_id": "66a635b9822727e7f632d75ecaa2e8f433f02707a34b66803d159d83d8c3af23",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf",
"similarity_id": "2a04a674a6521a4d42415d33d3c4dfa5da68ae752bf96e7e6d63961ed032cd02",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf",
"similarity_id": "84d74e39b8bfa3b2d7126265dcd281d632737137db2309bd687414473a055f76",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive1] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "aws_instance[positive1].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf",
"similarity_id": "06b2706778746d1f6a328132e6c8b0d7a591d5e3b7095a553b5f48954e7ede4a",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "aws_instance[positive7].provisioner",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive7].provisioner.remote-exec is being used to configure AWS API keys",
"actual_value": "aws_instance[positive7] should be using iam_instance_profile to assign a role with permissions"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf",
"similarity_id": "7cbad8835bcf7c1a276767bfb2f12ecc7c4a82821becc219509a56941c184161",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive2] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "aws_instance[positive2].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf",
"similarity_id": "e172b01cb18ce6733142f2b15df47b8abadc50dd7049712f835b5d4cb8758411",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "aws_instance[positive8].provisioner",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive8].provisioner.file is being used to configure AWS API keys",
"actual_value": "aws_instance[positive8] should be using iam_instance_profile to assign a role with permissions"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf",
"similarity_id": "510a8aba1db8ca85d154d119507f1071ca6d17f53c55920ff20152ec51674cc6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf",
"similarity_id": "239ad16a6d0ec2682d109bf01a62eee515b0f6402dc6a645e55acb33c022d54d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf",
"similarity_id": "4d02e13e7176172a01c31ebe82649c010717abf870eb661d2497a6641ae161ab",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[positive6]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[positive6] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "aws_instance[positive6].user_data is being used to configure AWS API keys"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf",
"similarity_id": "50259ca980dd7c2fcdb79a83a03b8b0664db76b63e673184508bbc2b24df3a79",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "module[ec2_instance] should be using iam_instance_profile to assign a role with permissions",
"actual_value": "module[ec2_instance].user_data is being used to configure AWS API keys"
}
]
},
{
"query_name": "ECR Repository Without Policy",
"query_id": "69e7c320-b65d-41bb-be02-d63ecc0bcc9d",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecr_repository_policy",
"severity": "LOW",
"platform": "Terraform",
"category": "Best Practices",
"description": "ECR Repository should have Policies attached to it",
"description_id": "cb9636f6",
"files": [
{
"file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf",
"similarity_id": "61f8661cbfe9003245484573a2b55043d4746658682994710279d0012ae554bc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[foo] has policies attached",
"actual_value": "aws_ecr_repository[foo] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf",
"similarity_id": "fcfc88f5d76e524fe25d71598bcd01ec6e7c8e22c325d32e5f1e2e074223810c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[foo2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[foo2] has policies attached",
"actual_value": "aws_ecr_repository[foo2] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf",
"similarity_id": "eecb04681d7dbe9dda52097a1f00e2ad386f4d087eeb0158379b08748bf2a8ba",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[foo] has policies attached",
"actual_value": "aws_ecr_repository[foo] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf",
"similarity_id": "7eab93cb1a5b09b51350948962465e8b963389e244438fcc02ea3a88510c255a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[negative1] has policies attached",
"actual_value": "aws_ecr_repository[negative1] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf",
"similarity_id": "76cc7a9461ccae1d77aabc54d2144139a0b701363a0072ff1672d0f293f9f76b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[foo2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[foo2] has policies attached",
"actual_value": "aws_ecr_repository[foo2] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf",
"similarity_id": "ab39e455167805805c4cdb1f557862c901655f74dfc3b59e8e1cfcbaae11a2df",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[positive2] has policies attached",
"actual_value": "aws_ecr_repository[positive2] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf",
"similarity_id": "41d8b392ad235c3edc21ad1949cb2dea672f8b2eb66f34c6aa034806305fa8d1",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[foo3]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[foo3] has policies attached",
"actual_value": "aws_ecr_repository[foo3] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf",
"similarity_id": "ecd63d0819ee39da31f410c815a244766cf42f32cfe0cb4c2236ec19db2b3259",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[negative1] has policies attached",
"actual_value": "aws_ecr_repository[negative1] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf",
"similarity_id": "92a07dc4b4c5d1ff71a7894317c5ec66fc318281499385282fc6ae148012ee48",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[foo2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[foo2] has policies attached",
"actual_value": "aws_ecr_repository[foo2] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf",
"similarity_id": "a3a3b0ddb0c3347f42fbbdd1a3df6a05be7fc4641821b5b94df24172713e7a39",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[positive1] has policies attached",
"actual_value": "aws_ecr_repository[positive1] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf",
"similarity_id": "6e70fd5a74b4785fb59ad8ade508ffcb22add60de80d56738dd010ef90d79f8e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[foo] has policies attached",
"actual_value": "aws_ecr_repository[foo] doesn't have policies attached"
},
{
"file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf",
"similarity_id": "928eb27755a917965f50bc22837bd086a9720e3a3b408cd92028b49246daea36",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[positive1] has policies attached",
"actual_value": "aws_ecr_repository[positive1] doesn't have policies attached"
}
]
},
{
"query_name": "ECS Cluster with Container Insights Disabled",
"query_id": "97cb0688-369a-4d26-b1f7-86c4c91231bc",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_cluster#setting",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "ECS Cluster should enable container insights",
"description_id": "b48a7a70",
"files": [
{
"file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf",
"similarity_id": "fd7ce63ec0c27eede371cd75faa44d20b7857668219142aa30643548b1ce7a46",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_ecs_cluster[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_ecs_cluster[foo].setting.name' is set to 'containerInsights' and 'aws_ecs_cluster[foo].setting.value' is set to 'enabled'",
"actual_value": "'aws_ecs_cluster[foo].setting.name' is not set to 'containerInsights' and/or 'aws_ecs_cluster[foo].setting.value' is not set to 'enabled'"
}
]
},
{
"query_name": "EKS cluster logging is not enabled",
"query_id": "37304d3f-f852-40b8-ae3f-725e87a7cedf",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_cluster#enabled_cluster_log_types",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "Amazon EKS control plane logging is not enabled",
"description_id": "80a41f88",
"files": [
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf",
"similarity_id": "ea23cd17cdc6af671a04d24087afdb603c526339b6bbc49b3a050ce1a479953a",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf",
"similarity_id": "9af86bc9ad868c65f393ea73969843547349912266ffaf73998cb7bbddf1c300",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf",
"similarity_id": "5ef537c677a6afba218fbb49a0d2912a9ca4421dbd290905794a4fca73d147c5",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf",
"similarity_id": "aa38638821da64182ba6325b3108229b568f6fc86d8e34bf4cb54f712ecd3e64",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf",
"similarity_id": "12e2f7ef77d7217d1efac4505c8f6ffd3dd1bf7f74da0ea29feaabf853a5cec8",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf",
"similarity_id": "474ec310269cb47c2e8c502f9780dd00c88229c360f81bf46098b61de4b09566",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf",
"similarity_id": "acf0d6fe41f3ee63b4cdd8dfd44c11daeda14f66851c0fa4a923a108f5f4311f",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf",
"similarity_id": "506a86eef7b5f37f51868cd6b50172d6676e2ba4e9fa298ddb40b2474ac12b13",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf",
"similarity_id": "7952c870e2b60992948cb69971ebf217cd3bbd3ffa20d1aef570779e7b4c6c3e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' is defined and not null",
"actual_value": "'enabled_cluster_log_types' is undefined or null"
}
]
},
{
"query_name": "Global Accelerator Flow Logs Disabled",
"query_id": "96e8183b-e985-457b-90cd-61c0503a3369",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/globalaccelerator_accelerator#flow_logs_enabled",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "Global Accelerator should have flow logs enabled",
"description_id": "3670731d",
"files": [
{
"file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf",
"similarity_id": "5062e9e4c9a1fd516ce32e402bc055890601539522e8e9970dd89b7d16609e7e",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled",
"search_line": 0,
"search_value": "",
"expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is true",
"actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].flow_logs_enabled is false"
},
{
"file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf",
"similarity_id": "d3974b027b3698a009d0c9fad7eb69e174b34f2e530ef08f9025cf0303e21a89",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_globalaccelerator_accelerator[{{positive2}}].attributes",
"search_line": 0,
"search_value": "",
"expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is defined and not null",
"actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].flow_logs_enabled is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf",
"similarity_id": "7b17dea423272ac3111dd9c1defb6a5cb28358653af1b6766c2571474fbf0289",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_globalaccelerator_accelerator[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is defined and not null",
"actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].flow_logs_enabled is undefined or null"
}
]
},
{
"query_name": "Hardcoded AWS Access Key",
"query_id": "d7b9d850-3e06-4a75-852f-c46c2e92240b",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance",
"severity": "LOW",
"platform": "Terraform",
"category": "Secret Management",
"description": "Hard-coded AWS access key / secret key exists in EC2 user data",
"description_id": "9e8cbdfb",
"files": [
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf",
"similarity_id": "386eb6c894a751bb4c089aa6904a34450480e1be590711023a2a68ee14da0796",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "module[ec2_instance].user_data",
"search_line": 0,
"search_value": "",
"expected_value": "'user_data' doesn't contain hardcoded access key",
"actual_value": "'user_data' contains hardcoded access key"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf",
"similarity_id": "28ca023b3095df8bcdd8113702d7b4e7e6d7565bbcfdf27b4a8b0320b95299c9",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "aws_instance[positive1].user_data",
"search_line": 0,
"search_value": "",
"expected_value": "'user_data' doesn't contain hardcoded access key",
"actual_value": "'user_data' contains hardcoded access key"
}
]
},
{
"query_name": "IAM Group Without Users",
"query_id": "fc101ca7-c9dd-4198-a1eb-0fbe92e80044",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_group_membership#users",
"severity": "LOW",
"platform": "Terraform",
"category": "Access Control",
"description": "IAM Group should have at least one user associated",
"description_id": "c5730db9",
"files": [
{
"file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf",
"similarity_id": "285761394d82852ad596055c04de19f70aaf315c615e1076931a22a9073a79eb",
"line": 33,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_group[group3]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_group[group3] is associated with an aws_iam_group_membership that has at least one user set",
"actual_value": "aws_iam_group[group3] is not associated with an aws_iam_group_membership that has at least one user set"
},
{
"file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf",
"similarity_id": "805610ace38cf5a2e87c2ef32b969ac655106aa0fbfbad6b1dd257dec660c6ae",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_group[group2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_group[group2] is associated with an aws_iam_group_membership that has at least one user set",
"actual_value": "aws_iam_group[group2] is not associated with an aws_iam_group_membership that has at least one user set"
}
]
},
{
"query_name": "IAM Policies Attached To User",
"query_id": "b4378389-a9aa-44ee-91e7-ef183f11079e",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy_attachment",
"severity": "LOW",
"platform": "Terraform",
"category": "Best Practices",
"description": "IAM policies should be attached only to groups or roles",
"description_id": "32ec58ec",
"files": [
{
"file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf",
"similarity_id": "4619351e06f1202125fc936249bf43cd1ff9f8aa11aa8cf5c2aebbfe70366175",
"line": 16,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{positive3}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf",
"similarity_id": "679e2c76614e5e49869059447940cc5e3165f92a31f48ade26047523c14fda95",
"line": 21,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{positive1}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf",
"similarity_id": "1b1a88ebb0d04ce7b81d092077fc19c5bc8b0adc573cfd58ef281b72f254ad8d",
"line": 16,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{negative3}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf",
"similarity_id": "1bf8f2601c8486a9708416092f309ea29a76b7cf51ef881d796ba9c7f1b793bd",
"line": 18,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{negative3}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf",
"similarity_id": "6419b72051973e4c00d7d54b48f55c34c1cfca8bf8c75fd495d41b5747f04328",
"line": 18,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{positive2_3}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf",
"similarity_id": "6fe36dca7250fca742b2bd26a5cf6d1f181d7718357d641fe1ce1571b0cf3c36",
"line": 14,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{positive5}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf",
"similarity_id": "1448f6502362444803952fac7aa4babd5c2e85d8bb7978861404a2d1f4c3e93e",
"line": 14,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{positive4}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf",
"similarity_id": "d3dc6076fb6b17fbb5ba5f8c0696525805a43326323500b351eb474286337656",
"line": 18,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{positive3}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf",
"similarity_id": "52e90dd603b1b654528c98bd55be8a6165eb0db29d1a4160f5741bfbd7ea547e",
"line": 41,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{negative4}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf",
"similarity_id": "b0eec0b0ac66adb9d0af4160872d383af75648d0ef158c475eb861a72bc3d2d4",
"line": 18,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_policy_attachment[{{positive1_3}}].users",
"search_line": 0,
"search_value": "",
"expected_value": "'users' is redundant",
"actual_value": "'users' exists"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf",
"similarity_id": "16394178b78c3b4d7fec4930b6a69874934510ee21d280106ef3d21ac31cad5d",
"line": 27,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy_attachment[{{test-attach}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf",
"similarity_id": "cdaf19088a4051d29f0ebc58892b68aa195bd43b1ff5429b60e07eee8fbb3663",
"line": 17,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{positive2}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf",
"similarity_id": "640d8318e35394c2680e0d8a3abda32dc62fc3b523acd771c26346edbe721838",
"line": 14,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{negative3}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf",
"similarity_id": "0027672efbb7f9c72af92fcfdb70fde73a68685dcdf81354b5bb5c30d00004ed",
"line": 21,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_user_policy[{{negative1}}].user",
"search_line": 0,
"search_value": "",
"expected_value": "'user' is redundant",
"actual_value": "'user' exists"
},
{
"file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf",
"similarity_id": "67dc74aaa73e6f5da59f0d8f445dcfd966fd7c16aa365f4b5af2013497a6baad",
"line": 51,
"issue_type": "RedundantAttribute",
"search_key": "aws_iam_policy_attachment[{{test-attach}}].users",
"search_line": 0,
"search_value": "",
"expected_value": "'users' is redundant",
"actual_value": "'users' exists"
}
]
},
{
"query_name": "IAM Policy Grants 'AssumeRole' Permission Across All Services",
"query_id": "bcdcbdc6-a350-4855-ae7c-d1e6436f7c97",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role",
"severity": "LOW",
"platform": "Terraform",
"category": "Access Control",
"description": "IAM role allows All services or principals to assume it",
"description_id": "948aa2ac",
"files": [
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf",
"similarity_id": "a8586916c33865b58fdc9484bca98bc9f510eb2858b0a32abf2ca2f6f612b89c",
"line": 70,
"issue_type": "IncorrectValue",
"search_key": "aws_iam_role[positive2].assume_role_policy",
"search_line": 0,
"search_value": "",
"expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'",
"actual_value": "'assume_role_policy.Statement.Principal' contains '*'"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf",
"similarity_id": "2b9c4a71c4d061182cf960f68ccedd0222857f876febf7fbc615a39d81c230fd",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "aws_iam_role[positive1].assume_role_policy",
"search_line": 0,
"search_value": "",
"expected_value": "'assume_role_policy.Statement.Principal' doesn't contain '*'",
"actual_value": "'assume_role_policy.Statement.Principal' contains '*'"
}
]
},
{
"query_name": "IAM Role Allows All Principals To Assume",
"query_id": "12b7e704-37f0-4d1e-911a-44bf60c48c21",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role",
"severity": "LOW",
"platform": "Terraform",
"category": "Access Control",
"description": "IAM role allows all services or principals to assume it",
"description_id": "a54d0d27",
"files": [
{
"file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf",
"similarity_id": "c394fc4d53436ed1caef5982a81ff45e0700de56565da09f93f3ab704199195c",
"line": 37,
"issue_type": "IncorrectValue",
"search_key": "aws_iam_role[positive2].assume_role_policy.Principal.AWS",
"search_line": 0,
"search_value": "",
"expected_value": "'assume_role_policy.Statement.Principal.AWS' does not contain ':root'",
"actual_value": "'assume_role_policy.Statement.Principal.AWS' contains ':root'"
}
]
},
{
"query_name": "Lambda Functions Without X-Ray Tracing",
"query_id": "8152e0cf-d2f0-47ad-96d5-d003a76eabd1",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_function#tracing_config",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "AWS Lambda functions should have TracingConfig enabled. For this, property 'tracing_Config.mode' should have the value 'Active'",
"description_id": "2f90e1e9",
"files": [
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf",
"similarity_id": "90c962f52ea5fed37397420fb45e01ab7d02ee5d6707eb50f951ccbdf1a9e0e9",
"line": 42,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[positive3].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[positive3].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf",
"similarity_id": "221c1316482638700a2f8404f25ec36edf60cf4788960eaffbbd4e2cb6e19619",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[example]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[example].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[example].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf",
"similarity_id": "879dd6eaf9117579e428fd7c9764df817b53612e481a9701cac2fef30a866eaa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[negative1].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[negative1].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf",
"similarity_id": "f9a59c4f008029eb7cafa5be32b4bcdfce73aa126222b82f5fd1795a638f9570",
"line": 45,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[test_lambda3]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[test_lambda3].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[test_lambda3].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf",
"similarity_id": "da77dde7226b2785bb929bd0569096bbf06dfed82552a22db0f0269ed02e4d0a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[positive1].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[positive1].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf",
"similarity_id": "e267a4abe1ea25b3bcd73fe6c1032c04a2f98c5396b792ad8df4c83c8a554956",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[negative2].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[negative2].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf",
"similarity_id": "1ae5ef4c9c9b4fbe3a29775913c97c179493c7fa2056cffd7613d6197a888ff4",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[example]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[example].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[example].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf",
"similarity_id": "9c97c2999f97ddefa91676d42f4fc80fa0ece58b5d3aad894168e51b3f0676ac",
"line": 28,
"issue_type": "IncorrectValue",
"search_key": "aws_lambda_function[test_lambda2].tracing_config.mode",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'Active'",
"actual_value": "aws_lambda_function[test_lambda2].tracing_config.mode is set to 'PassThrough'"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf",
"similarity_id": "c36c67bbf19e43571a3f0c25cd25d8a0d02b75f347310432f0235f9f577dca51",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[my-lambda]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[my-lambda].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[my-lambda].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf",
"similarity_id": "4281231e68cfa1f32f1d8548bb255521f0556a0590581b416a20ac4c11449fb4",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[positive2].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[positive2].tracing_config is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf",
"similarity_id": "2ccbdaf936a8640323ff8f4571e340c35b10b037a4acecb72967560db09213fe",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[test_lambda]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[test_lambda].tracing_config is defined and not null",
"actual_value": "aws_lambda_function[test_lambda].tracing_config is undefined or null"
}
]
},
{
"query_name": "Lambda Permission Misconfigured",
"query_id": "75ec6890-83af-4bf1-9f16-e83726df0bd0",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission",
"severity": "LOW",
"platform": "Terraform",
"category": "Best Practices",
"description": "Lambda permission may be misconfigured if the action field is not filled in by 'lambda:InvokeFunction'",
"description_id": "8fb6f06e",
"files": [
{
"file_name": "assets/queries/terraform/aws/lambda_permission_misconfigured/test/positive.tf",
"similarity_id": "b8cc9c2cf47dbd3e2763ae84228a73c6e4d8f1b1372d1df2e530bc0ca1a645a0",
"line": 2,
"issue_type": "IncorrectValue",
"search_key": "aws_lambda_permission[positive1].action",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=positive1)",
"actual_value": "aws_lambda_permission[name].action is positive1%!(EXTRA string=lambda:DeleteFunction)"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf",
"similarity_id": "7de0da40985af94826cf7e9ac79ceebe2450d6023499fe28ae74f514e2e60955",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "aws_lambda_permission[all].action",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_permission[name].action is 'lambda:InvokeFunction'%!(EXTRA string=all)",
"actual_value": "aws_lambda_permission[name].action is all%!(EXTRA string=lambda:*)"
}
]
},
{
"query_name": "Missing Cluster Log Types",
"query_id": "66f130d9-b81d-4e8e-9b08-da74b9c891df",
"query_url": "https://www.terraform.io/docs/providers/aws/r/eks_cluster.html",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "Amazon EKS control plane logging don't enabled for all log types",
"description_id": "e89d4ffb",
"files": [
{
"file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf",
"similarity_id": "29c1c63896bc934cb28fc15f46bd6b5b3e0503472fcc18a0684a51906332225f",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_eks_cluster[positive1].enabled_cluster_log_types",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cluster_log_types' has all log types",
"actual_value": "'enabled_cluster_log_types' has missing log types"
}
]
},
{
"query_name": "Open Access To Resources Through API",
"query_id": "108aa260-6dab-4a75-ae3f-de917d634840",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/api_gateway_method",
"severity": "LOW",
"platform": "Terraform",
"category": "Insecure Configurations",
"description": "Open access to back-end resources through API",
"description_id": "13e1db34",
"files": [
{
"file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf",
"similarity_id": "b5186c7355c674a759a119eadf0ea62d9e92b31f634d6ecca779fbdaa91e0410",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_method[positive1].authorization",
"search_line": 0,
"search_value": "",
"expected_value": "'authorization' is not equal 'NONE'",
"actual_value": "'authorization' is equal 'NONE'"
},
{
"file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf",
"similarity_id": "7fc688aee3afc1726301df553ea23582bd273e8d5da9efcc6c0faad15668d10e",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_method[positive3].authorization",
"search_line": 0,
"search_value": "",
"expected_value": "'authorization' is not equal 'NONE'",
"actual_value": "'authorization' is equal 'NONE'"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf",
"similarity_id": "a604af7dbec02fc8fe1003ea1b5d40ef5af5f2a992926ff84de55b87cadd3c44",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_method[positive1].authorization",
"search_line": 0,
"search_value": "",
"expected_value": "'authorization' is not equal 'NONE'",
"actual_value": "'authorization' is equal 'NONE'"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/negative.tf",
"similarity_id": "e1422fdec41b14fbe25c139e7d3afe1230e677fa2493c7c63885ef292fa8d368",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_method[negative1].authorization",
"search_line": 0,
"search_value": "",
"expected_value": "'authorization' is not equal 'NONE'",
"actual_value": "'authorization' is equal 'NONE'"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_does_not_contains_an_api_key/test/positive.tf",
"similarity_id": "428222b967fd3426fb88fd8b8dffe7bea17c413eb467ace7881de81cc32896c0",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_method[positive2].authorization",
"search_line": 0,
"search_value": "",
"expected_value": "'authorization' is not equal 'NONE'",
"actual_value": "'authorization' is equal 'NONE'"
},
{
"file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf",
"similarity_id": "479900699128eaabffa3c92959cb9f0abca3d57479dd45d55385d3f9fb745274",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "aws_api_gateway_method[api_gw_method].authorization",
"search_line": 0,
"search_value": "",
"expected_value": "'authorization' is not equal 'NONE'",
"actual_value": "'authorization' is equal 'NONE'"
}
]
},
{
"query_name": "S3 Bucket Logging Disabled",
"query_id": "f861041c-8c9f-4156-acfc-5e6e524f5884",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket",
"severity": "LOW",
"platform": "Terraform",
"category": "Observability",
"description": "S3 bucket without logging",
"description_id": "fa5c7c72",
"files": [
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf",
"similarity_id": "0915aa52adbb371bb4a7488155e4ef394d35f37ed1c890a4f8f12f1f186c8752",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf",
"similarity_id": "cc9bf4dae29fd0f2bc32e10d8d92e1912ee7c4fd592b08539b0336d6d3ed22d6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf",
"similarity_id": "08d2f1ba393b422a98ae80ecb6474eb1ac6fee1fa8eb9f19bf4510a9296409bf",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[b2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative2.tf",
"similarity_id": "81ac236433d26b714167f13fd591d8a3ad06464d31d765fbd872ef39335c3ee5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf",
"similarity_id": "73d4acf2a493d9205572152fa1ae35fe19df7217bee1c155bdc768f5821142d9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf",
"similarity_id": "72527cd0cae9f92f3bfe3288682e583b00c131e969c03fd54ffc328f1087c5e4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf",
"similarity_id": "7d7d60194b30a7ba7c453791434402407a8b6401f1573a70d9fda7ae436f3c41",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf",
"similarity_id": "681c66faf22b5e1e1e967afa02622bdafa82545607fe5cf81641b4bc3657549e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf",
"similarity_id": "8d0898acec0a1ba12648a3b4d44702f66878f2795166157fd319ca1ca42142aa",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf",
"similarity_id": "c0d8b47c8bd16658a8446cbeb7146fb7ad4320b8d03b79a4c52ad3ab6ed3b7e0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf",
"similarity_id": "d94db8aac11974b9d146f092656796518f48ccce376e51f8b9623802921c7a24",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[b2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf",
"similarity_id": "1dd387eb9dff7e7dcf6f1d587943420283e10d846cf4c193c79f2b20f4d35593",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf",
"similarity_id": "03cee6b520cecf1a644965448af933afc876c602f901b1b3fe5c634ffd3d5b67",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[examplebucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf",
"similarity_id": "6a33cd534b0a399020fec16e495133041119626663561f662edda39679589f7b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf",
"similarity_id": "ec018561940182f367feed6138921073f5dac046ba59c870555859e171c83d2a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[b]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf",
"similarity_id": "8477c4328c2315f099d0ff9e1a0545f9b95393f78c76ad712f7a32e94340093d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf",
"similarity_id": "f4c9b343b949dc66ce7458589cc6f5e2462b69bd31ae61a6852fe659270d1114",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "deb195785555f0c7744824380d5fd584f0241f64bd66d3f0ba6b0389ea838714",
"line": 20,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[foo3]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf",
"similarity_id": "6aa4bc5549c7e8abc450cf57da0b34bdcae87d5167bda63cb64618b6454e36d2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf",
"similarity_id": "15c731818a0518c1cbd40cfd9a081f21672f9df569b04f43b6ac5f3ce21c184a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf",
"similarity_id": "fe333664110b55936296c58e8f0dd89292300a89cf18a5e08927ee4b6f652876",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf",
"similarity_id": "f88320680c17805355e0ba4d193f0799d9500db8965342087ea0663b38ae0b89",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf",
"similarity_id": "1ed6def5a4f456db5c42e770f725f9167ca4512256e86d7bfafbdb2e6bbf28fc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[examplebucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf",
"similarity_id": "0f45afc602dc017e4d3d51b3e3d457c3ba3d14df77dadd4f14d41d02b483af89",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf",
"similarity_id": "a1787bcb105b7d684f4d275c74708a5f4bcfc9172025de79c7832df2feae319e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf",
"similarity_id": "70095ecc46abad3919fe45647a7ef9dbe372e3be0b578ab590add42a1319e82e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf",
"similarity_id": "9d4be52e420a24181dfb42916f1f7ddaeb7bf4fc86c942aa081684ff48fa416c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf",
"similarity_id": "8065e73c191fe04b214bcee64205162309d146debceafb9c6f1f2fd205cc4708",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf",
"similarity_id": "41de94e33d79f2f5ceb94789cb2266dc502f6237b08814d3dc1fa641bcc1a9da",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf",
"similarity_id": "3ab80c87b6a52b8f6ea28304a0aa5e66e7fff00b3f68ab2525ded6bc96be0f1f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf",
"similarity_id": "39aaecdf77977a57260bab5f6eb8e175a8835477dc7d6802456ac8153c2295b1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf",
"similarity_id": "260607d6f88cba8d3758db9d6c48ed9c9f77675557a600e78751f1a506606795",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf",
"similarity_id": "b9c22b6443fb1c72003d54b42ce03b29ab342831be3c8fef591e2069a49bc9b5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[hoge]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf",
"similarity_id": "1ca1a3389568cd4a212e00b24d6815592d41128a893f4a981c71e409b1138fc1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf",
"similarity_id": "3b86147e87ac88cd34567124e616ab4272f1aee209abf5dbfbb559d542a1c389",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf",
"similarity_id": "d9df5ecb82ba61b3b1f4d11c2a835f8a6d6ec6f2abf72553094a643f9d1c1d96",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf",
"similarity_id": "b902ca93d0dd65dec9401d421fc8551ce95b9e01fe376fd1c63dc289b49964ca",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf",
"similarity_id": "0315960ed11da1920ddcd1c88590284897e8960428dc3f9029fb54c8682a64fa",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[public-bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "ea12bb651a66eb7ef1ef19e1cf74888cf9939eafda0595c20c38733554cb4d6a",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf",
"similarity_id": "634cb860e1eb17b6b2ea7823138f533ed1de06e73a6f8211630b60dc993dbc2b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf",
"similarity_id": "ab2c99c73f0517c204ef944863cfc24a334d7decae6a278c026c88c452a4ae9c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf",
"similarity_id": "2573b12ac2dbdf6ea55ea97db3082db15a486d7874205d3155562eb5a7ce0605",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf",
"similarity_id": "a3a0615a6c74c17c71e86faab892abae8abe4f564142ad45743549e62ebc95cf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf",
"similarity_id": "3988d7d4b1e7c3f11f8982e6710721bf80fdadc5b3935de4dfa569440fee00c7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf",
"similarity_id": "9aa262582ff7169dd37bf14666416bfcade926adf997a9cb66c6f4a0b3b215f1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf",
"similarity_id": "dbd6f9d2ef166a294a9716425ae89bd7dddccf9dffeaa1da594f949bb8664364",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf",
"similarity_id": "7d7b7fdd970ce0417c7e568ba68c96e67b301cf998d8da975cee54d95e3fc0f5",
"line": 69,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf",
"similarity_id": "01ebbbc0814026249abe28d344f7c9685a2cfdc3f7da904b04ac5e81a331e3ee",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf",
"similarity_id": "b75cb331e1a12cb3c57313e105d1fa3f18fd95336be85b1461eca2ed3c6ee7fa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf",
"similarity_id": "d7807cdc2179397472f3afc58aae2b649abc46bc9dfc91f467d4565b86b4d6e7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf",
"similarity_id": "6df8fa568d393e4afaa9ef9f0c68db065e79edd30269354a4aead732b78351e5",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[b]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf",
"similarity_id": "daabe0b8ab0b25989d23980f116645dd15ffadafd6b2dc87f3425040fb3a765f",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf",
"similarity_id": "54bb5a2e86fb1ef979a54344d1cf84af0d3b3d2db5333e2c93b8558c353b56e0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf",
"similarity_id": "d4ebc6b252560b21b287c3cf9dca6241be0c4212d96c66d3de450ea9d5cfc32b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf",
"similarity_id": "c9797a7a687eb64048e7a67e177250875cafd9d8f20ddbc2ec911cd4997b1e47",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf",
"similarity_id": "ac31511dfa5fcd27c24e6785143f4b997d3f83d0f29c58c4ebf6f2d112722f39",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf",
"similarity_id": "9afe4fd52fb3e57d863b9c43c4a4053017a8f750cb7cf082d48adf1dbbae8f6b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf",
"similarity_id": "023e1312fa46619b8e401bb8088657f70ae7eecefad946566e4b8e3131c9f649",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf",
"similarity_id": "6ae7fe45f53495b56d1bbf45cb61f185bac67a03754f0d69115f9590a86449a0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf",
"similarity_id": "39a30aa9b09b75a2ecbc508760f6e68d2f1757a70463a061137ded98c0520842",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf",
"similarity_id": "8eb933ca43156e90261b896b7b181596e56a174b61d7c73af3c785f2f91cb298",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf",
"similarity_id": "8e16d8e4c29e049641699297906e71b844137a471c31f72d5bf8ccd0ad39f936",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[public-bucket2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf",
"similarity_id": "0dc544083130ec1fcaa0db8fc0ff334ee442e1b65fb7258ccb5524d2e344cb19",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[b2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf",
"similarity_id": "4e636d1f97e1f2cfa3c0db39a86ab833e2048cb602cfbeed5e69db546ec480a6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf",
"similarity_id": "b6bd290c669cc5a290e14a6f8b13e94c800b12fdc5f6c8b274be7b20cd820d43",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf",
"similarity_id": "9dd31e0d0c17a9a1f42e674d7a6266d0f295a080ae9db3d008c7082a7373b7e1",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf",
"similarity_id": "6b7e683a6c4ad57226d6cccc8a3a3567cda15bee638dfd9ec532f55416de9a32",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf",
"similarity_id": "4fcfb8b719aa40a89a931533f00d6c1ea7e4c9b56eb2f4db31ccc1e25f68cf85",
"line": 19,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf",
"similarity_id": "7d1fc5e13ce4debd7e306fd9fd67af6f8f9f1b6d59141b6ac4bc8f2aa77a9c0a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf",
"similarity_id": "e3c2491f7b9e0558bb0dfa1766243416afcab98ab4414eeba9294ac7dcbd5a5c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf",
"similarity_id": "37d1f089b978b8f000c435d2c195ec194ff7d1e9e7b9b918a2088dffc0684de3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf",
"similarity_id": "ebe16727aad9266db3881f15d4683c3b9459db73ec614e6522c4a339c6fb092b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf",
"similarity_id": "00bafa01ec47e3a3437979f8b1ee6533d0b82b65bade3a2c5d08fea5954acbc3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf",
"similarity_id": "dce28f927cade1cd6db83ea98553e0cd9b206eaffd6dbe2691c32ed5b2f0e189",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf",
"similarity_id": "03c6bca4573b6e5586d17b38878736a0d6bf7dd4f7fe15f1e6636c2eb9b7f8a9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf",
"similarity_id": "4c100307872c0e696614334030b726cbcc9e07007b32adb684669ee2c8e6e4d0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf",
"similarity_id": "067cbba611660ee39e3093b4de55bb6630a896f84eaed9e1bbd39f08c1a15470",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf",
"similarity_id": "f56a895cb2703452e851707aa1ccbff17f64973332310afebeca0fa063435156",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[log_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf",
"similarity_id": "56321e63cf9bf7e585aa5b32cf746a9a472182a42179f5b6b44a7168a572eff4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf",
"similarity_id": "1eef054ca8c0cf3fb61e3f544cf8969bac8ec118b1e1afc953ac295797341989",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf",
"similarity_id": "b2be7114050039888ec68b11df402591620cb364530d1469ab8ea385dfe3cd98",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf",
"similarity_id": "d0e495aa3e76a7f477c0a16fdbb23d9529908c14b369d9b4008be62691f0445f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf",
"similarity_id": "e46490a206cfeb7922bdcb6de0cefd97494201d0b0b7a502a610951ca64b08d0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf",
"similarity_id": "acdf13f0aba1f64a6ec3cd2c5d0fccea45bf730ba0644c3791ac486144b5d9c3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf",
"similarity_id": "bb0a883ebd72676d1d7eeff73de387ebbd2ea56e41ec1e9e1dc8fad88fab7d34",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf",
"similarity_id": "96a715108c28aa063a3696d9d7187b18203b780a99306c68943a67e88000dcd7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf",
"similarity_id": "17ab3cebb90e1ac64eea3309d43af7759795bdb7060e7d923bdf714b12d8a1d8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf",
"similarity_id": "61150f3e4862e130dc7225977347f17fafbc02f909c47585010fd36073e56f4a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf",
"similarity_id": "4d142c7a002de3bccdbd4da870de9247d5b64df77923b7c77e3fcd22dbf2e164",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf",
"similarity_id": "330d36cefe4844ed71344daabb7dcc6706ba82c35eb00fea6455445352609767",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf",
"similarity_id": "51f3df7d783896f1cf3b10f737d51a336a0ff74579aacceaf3556661e1168620",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf",
"similarity_id": "0adb6b9837255be0951c00d3718d8d7846144ff58a9467ff49600f8b01ee4711",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf",
"similarity_id": "0bf0e1e971097873aae8479f04d743c4ba60023a97252e07a71d4012c187bec6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf",
"similarity_id": "1449495796406077b9f7f690f44a390a6e6a2d6bca2fb0d53761d4b0d58830c8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf",
"similarity_id": "e094d4e7d171f8a25830bbf4f7b3a95b6e337408d8ce41eb39ac9393d28769ec",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf",
"similarity_id": "966c610ebfd12af0d920d1b8b166631b63efd91220d0d3fb96823f87f01c1b2a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf",
"similarity_id": "b04a5521901963ceeb3e93a2ffad00547327f2a0e1b822b7414263f7e30a31c6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf",
"similarity_id": "e272197b04b7353b2be59f77993911d206294ffbc1420751b9bed03c130e53d2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf",
"similarity_id": "06c253e54a7686d7d133993da0083c138e9278b226dde197bade410a3f53c0eb",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive4]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf",
"similarity_id": "742b12b99176590a7589937d6ef5c5472e1aec9e5ec957a85b3de0bd12b72fc8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf",
"similarity_id": "3c4fa30a384038c4cad1c1b9376fa405b809672d9197a5b5ccb25f8e847990a2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf",
"similarity_id": "743b530244ca7c8a84ac4edf504ac3ddbb12ab46ad4c8ac07538a22960b80da8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf",
"similarity_id": "3cf673c5a977f281054d6d4156be0e7596da5f884d4f0e395276c8e7b90d9ab2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf",
"similarity_id": "b5e83aa4afb5444142b4f791cdc2bf09d76595e2731815e1b6aef6519fa4b7b5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[b]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf",
"similarity_id": "ed137e59345e2b22f2e276ce551e52704fc4bd48cd3659533ebfe9d869054941",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf",
"similarity_id": "50c0f28599265a6084545cf5ecdb8a168a759c9bc1d1416a171767eeb0fd8de2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf",
"similarity_id": "fe6705cd4526a5ef249287c724128ba030604f3e06dc2a98fb29e2830ddb97e4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf",
"similarity_id": "aea43cd2159af3ccc0a42473849b9253a35889663cd42c48ed64ba235e9e457a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf",
"similarity_id": "7ce19aff3cccb4db66e6bf98e01f3907da2ea7cdee5a39fd031a9e91aab33ca6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf",
"similarity_id": "6542f539810975fd03fce457f6c126b121bc275fe28708e6015436cecf39d9d9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf",
"similarity_id": "c217babd1d0774280821f86c9a119648c254964ebd695e122c9d24193ab93348",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf",
"similarity_id": "18f347bba0943b04a2e48e68db2da150081d0ccc8416735f3887f1ae976b48e6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf",
"similarity_id": "7092ea9109a6c514ed12b6a4dcd850fb2fc453a495e7f36f7a2b3a1e78af98b9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf",
"similarity_id": "e6121dd5493655a20f002518e02c3e55f3eb943250e7245b0e252a9a77a508d0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf",
"similarity_id": "941c933f29b056495bb058522503c56a5632faab1df651c74ce5cdd153808087",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf",
"similarity_id": "42beaffbf742cd3f21e9efa2585aa345621a52a8a25b4b190e2b6f2a4875d8c5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[hoge]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "be9044d72e3bdf08621a66a937a4986f6c27abbc00f0f153241cd00731a2fd49",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf",
"similarity_id": "e41aa28a2426f4eafb157734d27c9df647e58fc424bab89506e77e9be3cbcc93",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf",
"similarity_id": "d6894906f876bc3344b4f5a3dff58286f2532322be0234814ed4124f556a2a0d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf",
"similarity_id": "15108fc8dd8d99782c479ec16bac84ccc0297ed32cd61e66891151cb974a9092",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf",
"similarity_id": "ef3e4154565720db79a1b6164fea48d1de681f7078cd5da14e617d4be2b2ba38",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf",
"similarity_id": "26278fba0f567aa336d0ef2bfee84346f1e43b5b037575d888829a85cf62ea88",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'logging' is defined and not null",
"actual_value": "'logging' is undefined or null"
}
]
},
{
"query_name": "S3 Bucket Public ACL Overridden By Public Access Block",
"query_id": "bf878b1a-7418-4de3-b13c-3a86cf894920",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block#bucket",
"severity": "LOW",
"platform": "Terraform",
"category": "Access Control",
"description": "S3 bucket public access is overridden by S3 bucket Public Access Block when the following attributes are set to true - 'block_public_acls', 'block_public_policy', 'ignore_public_acls', and 'restrict_public_buckets'",
"description_id": "aa9967ef",
"files": [
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive2.tf",
"similarity_id": "70c4308ef7d7d89ef019a60b350e28a0cf7c43e4faf5a891bfa62c5dee98f721",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "module[s3_bucket].acl",
"search_line": 0,
"search_value": "",
"expected_value": "S3 Bucket public ACL is not overridden by public access block",
"actual_value": "S3 Bucket public ACL is overridden by public access block"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf",
"similarity_id": "63e90b0b56709120009dab93e51095797b39bce1092455cd41fcf56e10db417e",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket[public-bucket].acl",
"search_line": 0,
"search_value": "",
"expected_value": "S3 Bucket public ACL is not overridden by S3 bucket Public Access Block",
"actual_value": "S3 Bucket public ACL is overridden by S3 bucket Public Access Block"
}
]
},
{
"query_name": "S3 Bucket Without Ignore Public ACL",
"query_id": "4fa66806-0dd9-4f8d-9480-3174d39c7c91",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_public_access_block",
"severity": "LOW",
"platform": "Terraform",
"category": "Insecure Configurations",
"description": "S3 bucket without ignore public ACL",
"description_id": "28aa7150",
"files": [
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive3.tf",
"similarity_id": "46421a142917c62555a69bd425075d2431dc40f63b57eaed61de4282be4e9758",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf",
"similarity_id": "9b3730e745dc2f4baedc0855136a9ac80ad27367d6982c79646e1360bd3ef900",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive4.tf",
"similarity_id": "ab2e0b6739193c438e2bec7cfb8295e3ddc27e60ddca4e60dbbf9ac10a375837",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf",
"similarity_id": "bbb6913a9203d9970df63e616286f66d320ef7b21afd69dbf55c54cb058c4df3",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive6.tf",
"similarity_id": "09d8ef7cbf80f91167e216be04a4354c46d652cc67b81ace9bc2869a692242c0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative2.tf",
"similarity_id": "3824f67d6190058404e60d9067d8524a7095f909383225db6476cba83d06f12a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive6.tf",
"similarity_id": "9174f3924a58fb4a5e0e51cf61a8a7e1accd1ead1097aa46f22b8d1b2bf72684",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative2.tf",
"similarity_id": "13c92f771db0b436736f34566562ab99b565d1e3fb37c16828c2355c1664a845",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative2.tf",
"similarity_id": "d1be204edb752c652abada7bb3bf5a891cd2f73d46bdf04b7514a466bef544ca",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive2.tf",
"similarity_id": "82166a5963fef238452e22e78ccbecf9f44dcfc8cb365d168c9a386c673df9ee",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive2.tf",
"similarity_id": "794e073f1b34dc13bfcff4a33fbc7ddbde933949bde0a8d263c07ad605742c3f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf",
"similarity_id": "4062d0be8cd3e56430b79319928ee478dff050ece61e0917128e0786e578a842",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf",
"similarity_id": "7106bfbd12b4ac15bbab4f3e09a6bbeb47f9c24c80f8c091c5acd822f35c1e74",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative2.tf",
"similarity_id": "c7a17f5acc8732f5d2692e3976d9bbec22c92166499b29fb4f1427b1c9c3fc6c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive3.tf",
"similarity_id": "60feebd225a2e753aedf60fa974036449c7c82a1ed00d670e5a6762b2a555358",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative2.tf",
"similarity_id": "ad20c8b8f6408498969d99b0901c9163cf047cf5c9fe8519a6dd87aa9401ed57",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative2.tf",
"similarity_id": "8310782747aa887c900fed4e72b880cd75596ff225156d2cacc2d237ec50f386",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative2.tf",
"similarity_id": "58eb8cc22bc7220f84cb1c98bc138f2f15a8756753b41591f37bda9c9e9b0b6b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/negative2.tf",
"similarity_id": "95e3596c6feb4929ca5c1e770bc352cb378a6b4ef8f8b970f1c9c7baa6da4960",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive6.tf",
"similarity_id": "ee4c600881beb53931b0bcc4dc9081b082c25db3c913c9d8f02f17c2d35403b1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative2.tf",
"similarity_id": "868ca309ac1af951565c615b30f5cac4ce0590914362962e9296c8456cd00197",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/positive3.tf",
"similarity_id": "55584d5e8a2c97650335e12d11ebf447fd1be8adc3131c376c0332f9f6dd0264",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative2.tf",
"similarity_id": "f2c4d02711c31d8064e8541b8d3c0cb497028ed9350d68ce9c5f4571ca9889ea",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/negative2.tf",
"similarity_id": "7e379ce70be7be1e2cbd2535423f228298d35d5bd4af08895ac1407ead5ee67f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative2.tf",
"similarity_id": "da28b27e0b7d31f2cb89e87424f70bf3ca3400a98eebe923ab5218f16d4f62ae",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive2.tf",
"similarity_id": "969d115e069f3f3d8145b70c18b6aff6cc3106df6d0b54f1fbeee95fa9a73b26",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative2.tf",
"similarity_id": "5f0d481638563d43ec8e0c780389a129fff129f5e26da6cc5db65822ca32f4e2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive2.tf",
"similarity_id": "3219ae66520350c5f684706fcee073780c38002c544c741cd7fc2649f4623546",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "module[s3_bucket].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf",
"similarity_id": "7915d61527e35dc8c02b27663bf0c4fabbbf951e906c955538a1b0c5145f21c3",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive2.tf",
"similarity_id": "5ff8e3d899ad48e8d9b12f045e457008c6a09c77d588d771483bf9a72a1fb3ae",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf",
"similarity_id": "a6a39dffa872be079622c039e04e4399055074f295f5115d6131860aabcf210d",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive7.tf",
"similarity_id": "67a9b1e5e52cd2bdd4ad70c8e4add2038d9b687e32b874fb2b71fe5e919ca4c8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf",
"similarity_id": "b0be2bb527fa9103cf66ef9e13af23feb65108f02ca4c3e382f54e36278fe67e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive3.tf",
"similarity_id": "dca212d4ca54b5f4e97e4596c5f1757644c374a302427e599af8d8a4d4b0f62a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive4.tf",
"similarity_id": "24bed4e79074a0732a976b6867b5a40c6546724e2c8ab94d030e14f905610389",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/positive2.tf",
"similarity_id": "93c1e82d98d27ee2b2a3f31855d00d9a2e6a6e581306e8ef0780d8d4649bcbce",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive2.tf",
"similarity_id": "a986fdaeb3dcfa6846a75b3c23c7e67f33af01504ea398ffbd9a7ff0937f0228",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative3.tf",
"similarity_id": "af2a1e63a149db3a47500c6fc17e68bf8177fc49650e64ae55b9f01c7abf88da",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf",
"similarity_id": "44e9de13fc33ead4f07ec60f220945bf3bcd413fd02bfd6888cec57abe58f37a",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket_public_access_block[negative2].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/negative2.tf",
"similarity_id": "2d0e65ee6668f306d2b249ac87480b41e7053e68ef8c8030bb4ef629819ba5bd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative2.tf",
"similarity_id": "f471149c7d3ba246caf92f1d9195ebbedf8c6cba384331a458bc76b95c0fa3aa",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "module[s3_bucket].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_access_to_any_principal/test/negative2.tf",
"similarity_id": "cb92fd01a9cd35a3b9871353a86e970ce81c493ca870e685ec73ecd2faa21833",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf",
"similarity_id": "e1aac6701373e656b46089f104a5419d540040231f98ab0d750b6c9f072c9325",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive3.tf",
"similarity_id": "4a3841fa0661203dfcb2d1cd254a9aea76f714695c44906f6907452f4f45c471",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive2.tf",
"similarity_id": "d458ca77a0c782aa5495c09c6dcffbe5a51522dc6e8ec1d9425077025d4fbc7d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive4.tf",
"similarity_id": "4491a578e416b4b72ce8d82ce8baa604d2633066aa2bcbe4067f72cb8115ca46",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative2.tf",
"similarity_id": "e5186d764509a91f4ccfb9b0913f0fc03345eae7bb18e8b9a45ebe36011c0da1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive5.tf",
"similarity_id": "954025b9ea01b3d8ad931ff920a1f73f15ad3991aa150eb8f226709e4d96e0ef",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive2.tf",
"similarity_id": "04d55ee345e43ceab854131a8805981009efa627ccb4192b0e0160a68b4c3d95",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf",
"similarity_id": "deeff4aa803636a318fda9ade59e079b385cd016936fbb3a84a7238c7df82fdc",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket_public_access_block[positive3].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive2.tf",
"similarity_id": "d86c04f2694d542fcced31feeb3dd8b71adf2af7af7bf9fd1187c7d4114f7909",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive5.tf",
"similarity_id": "fd19f0ed6d25e208608a32ec7b9f1d6cbe755a79dd68a69402b3139436833e6b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf",
"similarity_id": "0d4d10d2c9b1631c2ca6ae5b7ab45b7bd93d55d640cc9d2fe881831e3f4ac704",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative2.tf",
"similarity_id": "00ca0ad0f80858a9ce1ab151d3017bbb96bde0b23398af857cab5ea4619314c1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative2.tf",
"similarity_id": "a143e24e718793a6d30b701ee30d0565e121b76ec6b809ce2b583b274747984b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative2.tf",
"similarity_id": "02257d32562ca2c3cd49816be4ea43e120b3e8c0e7cf49ed49830e622581efff",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_put_action_from_all_principals/test/positive3.tf",
"similarity_id": "872ea1aecbf4506f275290b372bf0766832dfb09cfac56fa92ab7a62ad58253a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive3.tf",
"similarity_id": "606055c45c823870617251e820a02bff2fb6ba107fec0fc102a01d18cd8b782d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive3.tf",
"similarity_id": "d1cd614971c2b066cd8459ee0fcaf457ec703e1102301743a0e67045e9a35e84",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf",
"similarity_id": "b033cb9f3871079f45dad2fa67a95c1b430a81c31954e934685a5c62ef616c82",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket_public_access_block[block_public_bucket_32].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive8.tf",
"similarity_id": "2f92339539f4383b59efb26b0987b4d8a98d67e6876bacd5ea73f95a0a625bc8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_delete_action_from_all_principals/test/positive3.tf",
"similarity_id": "9b9f3ac357876ef050cd9fb45dd51de920f907417871ac7ddd0f811acfe7fdea",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative2.tf",
"similarity_id": "9603310a73bc8985fc6ed42b81aea4af36b5e5754731d2b8ea7d62d660df2104",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive3.tf",
"similarity_id": "8453bb65582e3eff5468433f889fae03e0e6f864321f5c31dc2a134975cb7aa8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative2.tf",
"similarity_id": "23022d71ac08b9b9136a5fc1934be199ca47267ea5cf57f7765568d83bd0c239",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative2.tf",
"similarity_id": "fbda4c542c849c120c0509bf0b1a2ded8b21314642c6ffc12e706a208c1ad7c9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive2.tf",
"similarity_id": "8538a926a7315f20bd3564b8f86bbb46c1dd3373ded43aeb6ab7c6dd62b06b74",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf",
"similarity_id": "c53add7236bc0318b9e19672762b2b207608ff85a6c0b190a5759770ba4cb617",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_s3_bucket_public_access_block[positive2].ignore_public_acls",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is equal 'false'"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "aba30c7598affff9a1359c4f720505eab9a84724f9ca16126b72c5db08df3e9f",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive2.tf",
"similarity_id": "552013651b2f48918d034ead4caebb9360d5563a002861d8bc1390c19753c692",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive4.tf",
"similarity_id": "9cb27d9f6150cceb8b56eaeefaa9688cd2dfeb4adc9f6572b691b5ee726128c4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive5.tf",
"similarity_id": "7681d963b30a63959ab466ddae0ad90fc4b1340b5d1ae8f24a801fff9321eea8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_list_action_from_all_principals/test/positive3.tf",
"similarity_id": "9a0b8e18b53794db1e2ce776a22ed89904f84b1daa080e83c9fb93059e6329b8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive2.tf",
"similarity_id": "75e30c83f46a2ac3a6830125984deb7ce8608dee361a6ebc8d078ba95d5c5608",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_public_access_block[s3_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "'ignore_public_acls' is equal 'true'",
"actual_value": "'ignore_public_acls' is missing"
}
]
},
{
"query_name": "DynamoDB Table Point In Time Recovery Disabled",
"query_id": "741f1291-47ac-4a85-a07b-3d32a9d6bd3e",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/dynamodb_table#point_in_time_recovery",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "It's considered a best practice to have point in time recovery enabled for DynamoDB Table",
"description_id": "205ac3d1",
"files": [
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf",
"similarity_id": "f03c038717719d4e52fd0afe624a281d49dfa0075398a0587e3cb73c1006b47c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled",
"actual_value": "aws_dynamodb_table.point_in_time_recovery is missing"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf",
"similarity_id": "74c6bd6c5318eaef60b3105fe86a3d0d2d9aacc51dec5e05b090058ba4634947",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}].point_in_time_recovery.enabled",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to true",
"actual_value": "aws_dynamodb_table.point_in_time_recovery.enabled is set to false"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf",
"similarity_id": "4d97910308cd6eea33fff5ebacfb96f384f273fdfaff8b3e520515e8e9883dec",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled",
"actual_value": "aws_dynamodb_table.point_in_time_recovery is missing"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf",
"similarity_id": "e3ab84533625c6e58bcb96022c917347f39b52c0f0fe9fa1fe99e2fdf060f6e1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled",
"actual_value": "aws_dynamodb_table.point_in_time_recovery is missing"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "845e0a2e82bc081983abd1ba64f65189f082447269a33753e9124a4359bba0c2",
"line": 95,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled",
"actual_value": "aws_dynamodb_table.point_in_time_recovery is missing"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "9d2737d2fb94bd186b96d28ebbe31e1eaadada3416977f7a4619401f44d4aeeb",
"line": 90,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled",
"actual_value": "aws_dynamodb_table.point_in_time_recovery is missing"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf",
"similarity_id": "2a606270f6c7bb7bf9298977e2f8c7f0f98d60cf7d258bff85b7512b5d49681e",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{example_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table.point_in_time_recovery.enabled is enabled",
"actual_value": "aws_dynamodb_table.point_in_time_recovery is missing"
}
]
},
{
"query_name": "EC2 Instance Monitoring Disabled",
"query_id": "23b70e32-032e-4fa6-ba5c-82f56b9980e6",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#monitoring",
"severity": "INFO",
"platform": "Terraform",
"category": "Observability",
"description": "EC2 Instance should have detailed monitoring enabled. With detailed monitoring enabled data is available in 1-minute periods",
"description_id": "0d5413e6",
"files": [
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf",
"similarity_id": "fb5e9e5c2d43d59b4d37d1c7f3f3f4a803d3bda9788dfdf522779036b06b30fb",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive2}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive2)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive2)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf",
"similarity_id": "01cb77186b543a354c34c5be8478f882788a57bb95516cebf48843815ac63920",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive6}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive6)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive6)"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "4e462c3427439c8cb969d1c0a4d05d37a8f77b22786044f14a3422dc5495c2eb",
"line": 87,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{test-ec2-instance}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=test-ec2-instance)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=test-ec2-instance)"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "616bc60d4322649c538dedd947befa0c9a64a29c15dc042d668c7ca738a258fd",
"line": 109,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{inst32}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst32)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst32)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf",
"similarity_id": "9645f50b3de117e8a021b8709a8b8bb5f7a9cd2d8c41fc606e852fd79c0e5a4c",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive4}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive4)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive4)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf",
"similarity_id": "85fcaacd9ef9041b5c6fb1f673033173a758ca10d4b9193897cf41cf75d4155b",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive5}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive5)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive5)"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf",
"similarity_id": "a2c506b7b224cce01b5d2281aaaffaedc631bd21a722c4727f46de453670002f",
"line": 107,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{priv_ins2}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins2)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins2)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf",
"similarity_id": "e4cbafb8a7d4d5062d2665acff7c953c35b9820b9e9bc08684f70b3751aae297",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive7}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive7)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive7)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf",
"similarity_id": "e9b1164c5be2c1bf401b14051485e55e49b181416e8ac0d493eb3e19ce56d420",
"line": 57,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{negative1}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf",
"similarity_id": "8e00104660bd173409b4276a534d79ef5defa26b8b193ba68d97a7c078ddf365",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive9}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive9)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive9)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf",
"similarity_id": "ff5d6b09922dfb8272d0ba8070a81a64a4775b6b1b8ff8515d58a29f0556508a",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive8}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive8)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive8)"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "371b01927a7c7096c6fec4d1e4ca5580773680aec38310a45655f107088c22da",
"line": 96,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{inst22}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst22)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst22)"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "bfb398b836f9c8600b4aba985efb752c9a8cfaa3f3a74f0e7f7cf6652ea6d433",
"line": 82,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{inst1}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst1)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst1)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf",
"similarity_id": "363534b3aca3623853f868a73d58fab0a88d49cfcaad45ae34a4988799fa918a",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive1}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf",
"similarity_id": "2cb5de106e6e7d8de2d0bbcf3b610c6ffb449ab807bfccf776089e4aa70f67cf",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{monitoring_positive1}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=monitoring_positive1)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=monitoring_positive1)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf",
"similarity_id": "69aa775d5948502a6e89d2e7c9ecb1e08c0fd427cbebfb9bc34f2a83075ad179",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{web2}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=web2)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=web2)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf",
"similarity_id": "6efb19f6ecf1966b5372ba125a5dd2536888e227c78503e5a06392132e0e4b63",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{web}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "62c7ec970e2906db2b7e4848c712f7b2153b68aa6835490eaa43e2e8084efb24",
"line": 88,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{test2}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=test2)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=test2)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf",
"similarity_id": "65d2089f6e5028e4590a61cb2829b75bd4f007475504600dcf33f48fab2e6f24",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{web}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "75893af01a4db33ecd80f9136e8e5664b24f93abe3500d0575bf1935bb104283",
"line": 108,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{inst3}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst3)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst3)"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf",
"similarity_id": "be5ffc7f628fbea762728309f0046f2603fe71649c76ca81adb0e0891fd0cfdd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{negative1}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf",
"similarity_id": "de72601496ae4e0a186d3d900b993fe11bea39d55051c5de3106ca74d100edac",
"line": 99,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{pub_ins}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf",
"similarity_id": "f4efba1f428b8ff2789680233bc04f2b9238332c3ecff635db7b45039e9f29f0",
"line": 20,
"issue_type": "IncorrectValue",
"search_key": "aws_instance.{{monitoring_positive2}}.monitoring",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is set to true%!(EXTRA string=monitoring_positive2)",
"actual_value": "'monitoring' is set to false%!(EXTRA string=monitoring_positive2)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf",
"similarity_id": "a4641650983d227d10d35a52e68db1e4d38aeda4f55420c3922c2474c6d81c88",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{web3}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=web3)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=web3)"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf",
"similarity_id": "8689c4dfb4cd75e31855e08033351624d05028a3409207b746b852ff99c9a1d8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive1}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf",
"similarity_id": "278d8af92a08362a9091a6dd4006e2b4c5776c879f2e0d79c7e0ee108a653a90",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{web}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "afc6976b05a7555c8f78892fa6264cd47b011e4790050a785180923e887180dd",
"line": 95,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{inst2}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst2)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst2)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf",
"similarity_id": "e604a1bb76c27d5c6b344de7d63eb8efca137069f5b01cf0ee9b751ad6a6cf07",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive3}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive3)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive3)"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf",
"similarity_id": "0c99cc2bfb0a7247589473e66b04eb2b339484b698f3b4fc52ea3bf6c6653c25",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{positive1}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=positive1)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=positive1)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf",
"similarity_id": "06ef5f50950fa554ab73735387a4725286824175219e4ff2c9246fcb9d0565ce",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "module[ec2_instance].monitoring",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is set to true%!(EXTRA string=ec2_instance)",
"actual_value": "'monitoring' is set to false%!(EXTRA string=ec2_instance)"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf",
"similarity_id": "c6109be8837868af7f05ddeabae7803c95e36ee62c26f58c305358924b3717a0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{negative1}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=negative1)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=negative1)"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf",
"similarity_id": "4e17df5fd2e1d30e13a180e8e6b81406c0a77337e80e6114e14ef941d9e4ae72",
"line": 99,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{pub_ins2}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=pub_ins2)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=pub_ins2)"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf",
"similarity_id": "6073e20678715b407134307b01ffee4b23e76a7face8e0b438ec12f5863bc0cc",
"line": 107,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{priv_ins}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=priv_ins)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=priv_ins)"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "52badb86aae36a8c0263149507e1c0d32e8aa6d9f02992368feadabaa4b38c60",
"line": 83,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{inst12}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=inst12)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=inst12)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf",
"similarity_id": "2514498a7e100d6f2aabacaa8cc4e1f0a7f2d59474e9cef8fb7d6affa5db3ccb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=ec2_instance)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=ec2_instance)"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "ede19bc1eb6ce8d021480f5880a66abb6bebceecf8503d927fd447d80b088c9c",
"line": 83,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{test}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=test)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=test)"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf",
"similarity_id": "72f91854c0268009c83b8c6af178e60a53876d296d3934e218cbfd20d2cd9020",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance.{{web}}",
"search_line": 0,
"search_value": "",
"expected_value": "'monitoring' is defined and not null%!(EXTRA string=web)",
"actual_value": "'monitoring' is undefined or null%!(EXTRA string=web)"
}
]
},
{
"query_name": "EC2 Not EBS Optimized",
"query_id": "60224630-175a-472a-9e23-133827040766",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#ebs_optimized",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "It's considered a best practice for an EC2 instance to use an EBS optimized instance. This provides the best performance for your EBS volumes by minimizing contention between Amazon EBS I/O and other traffic from your instance",
"description_id": "ddce4bd9",
"files": [
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf",
"similarity_id": "c4a06491dcea6102f5b74457b7bfb9b08a4d990808e9d3f8f85e35f51d959034",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_private_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "011dc8503dd732837ed7d4ee7617776ebbd3ed9cd7a4961a9b6837dcc91ed32d",
"line": 88,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "fbfb5c9607a895486d7c821ea64facc86d336e6f945f2bb0eb4082125b2cfe0f",
"line": 108,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf",
"similarity_id": "bc2f8f6fd18b3a94d87dca6b5435da921868a70fcd114cf5714b9fc040f60ca0",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf",
"similarity_id": "e52fc171c7e5ecb99bfa9c987476c634721c0c718ce5baa8fb0efc14a24c9ca1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf",
"similarity_id": "66354a1ecf30be3623f54604f8262119588fc6c2d0e91cd305b25f5e12b9e0fe",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf",
"similarity_id": "f8e171f90476547c9b64dfd758378f6ea6616d3dd39e015894d953388fab5ac8",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "module[ec2_instance].ebs_optimized",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is set to false"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf",
"similarity_id": "16d171e432e242727969a74f50061fe611a3b00051e34a59685f73375ebc3f7f",
"line": 99,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{pub_ins}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf",
"similarity_id": "ff87c287f6db10b6bd2f71b217955419f52b8a20e0417219261a4437c409179a",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf",
"similarity_id": "f7ccbb59bf0f8058b705b7c57d75ec788c42e9b9b30f63ecacfaa040490f67cc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "e9f59f9b1a23cbeb6c3a9b7238ff643c0ac4a328a92c2a842b6ea86a804f6ae2",
"line": 82,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf",
"similarity_id": "c220efbf0e25f49130e1d9fce452ae28a1ad5ce3c057b49b1547cd744ef8e566",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf",
"similarity_id": "a3ee63f10b14882d13199e67e085c72e201a3741499093466d299350e34b83c3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf",
"similarity_id": "23aea01abc940cecc8ce168c79eed044822f080a60dcd3aac076a7803a9e4cf3",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf",
"similarity_id": "af14fc5e97bd84336c325b1bbd3a5509d822f055e6a3566823f95b0af959fbae",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "f82a92f2fb8c79b56afe9e01c57ce2a7bea1d2572a8687d81f4040c53263d346",
"line": 109,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst32}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf",
"similarity_id": "3e5e65f8454f0431e7a877de325048184b8d6862c580f04bdf18163d797c2c18",
"line": 107,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{priv_ins}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf",
"similarity_id": "b3eaddee1331cd85e414f05354bf6e94a8df2b615af11495a180cae282158d1e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf",
"similarity_id": "8344b4229d994394d98de0a6cc664f50ba2b524395f29216245e88f1cc2f2abe",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf",
"similarity_id": "789764d470c6b4357f6a5f2ec52a2019060e8c08112c198e47ba46ca6f3c8c20",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive7}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf",
"similarity_id": "8a6b04dfd2de8f1cc74c02fd4c8503c8b901118f4703b78a11a6270aa29c86c7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf",
"similarity_id": "98d959307541f8d003537375269d0e23a97520f7c2f3613dfb999aed3d26ddfa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf",
"similarity_id": "ffa0acbfe39ec7c5c7d37d2c21442e7ac8721cafcdd13687a919926978f8df9d",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "7445785a11415e487ac2e63d28ad27f04713d50bf9db8fb4fc0dc7d20978fd38",
"line": 83,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst12}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf",
"similarity_id": "8acfb066efe90d2d3280c25ac5b00f8471f492930b54426362e5d290add9f32f",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive9}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf",
"similarity_id": "68aa819938a47ae9d655e54c504dbce54600ed5abfa51912d143fbe41348f238",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_public_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf",
"similarity_id": "4036bb57a8562699f2bc3e95855700f58ea64527e4d082e53e0ccef0b8f6092b",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_public_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf",
"similarity_id": "35a685e9c6c76e75f7617205e6f27563a882e47484c97f65d3e1731097802f84",
"line": 99,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{pub_ins2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf",
"similarity_id": "b4c6c88e31b4ce9ab062a79bebac8f35502ee7578c9ed8db5bf52e99b946a242",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "beb9d2f657e725c12fb24c822d85dd0e215a83050e104683ac4709a2318531ef",
"line": 83,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf",
"similarity_id": "c161e1efdd486d50ba5b75cf87d60d91e112c5f17c7c7f956567b70cfe4119bb",
"line": 57,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf",
"similarity_id": "985f79588fec3d23db5a958f5002f29d86bfc1d8983b5749504578e9197516ec",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf",
"similarity_id": "67e5ddad789bd369b3dc34e97a0372e9665d4392f17bd9ea7f9cd5dd0e35ca26",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf",
"similarity_id": "a81e2e8fe09364e404326b15c57a8f9b5a11bd3ca5dd416fa39525ee1bc219b6",
"line": 20,
"issue_type": "IncorrectValue",
"search_key": "aws_instance[{{web}}].ebs_optimized",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is set to false"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf",
"similarity_id": "d35cf5365ac696e1262568fb49a93ccae647e2b34abfc9f578b624abe9cfa7e7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf",
"similarity_id": "b087cb883ee2e13b010a776ee3f3f5a06ad211d7f468ad010bd7882957fd8d3f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf",
"similarity_id": "90b3da8eeaec7e202feea0b5f07ae04b35ee077f247d838fdd09e0ca7959092d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf",
"similarity_id": "b6325c56b8eef5cfb7790051ff9325e986238222df9016138531c485941a811a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf",
"similarity_id": "2b38d84be01cb50de9f772e44c02fac3946ff43a0e6ce3c4254f443af8c8e256",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf",
"similarity_id": "bbed9a3bac228c8202504c9ffd9c33d80fec44bd5cbd3d63e643bc32263fd357",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{monitoring_positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "ed81e1904a44154caffa2c6e722db22f6b49de57b6f8405d58c814b55c8ad89f",
"line": 87,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{test-ec2-instance}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf",
"similarity_id": "71ec4e8d73b9aae2218f697811c5f8a3769fb7d8e5b754932208924fd68cb10f",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf",
"similarity_id": "65de401a1a6d072ca37f926153076b6abbf568088794547b7bb5478f08c642a0",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive6}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "6503dc96aee5641ef965f5c227ba579ba20c8b359ab9bfd7c9d17e34eae4981f",
"line": 95,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf",
"similarity_id": "f158f107b10e43fafafc2ee787fe00da46ab7a00ed3d1df3ee61d7c1e1f35ee5",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_private_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf",
"similarity_id": "f5eaefa76d668c0d8d023406adcba65eab713450bfe0f79c38d02c5591d54991",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf",
"similarity_id": "125405ecf869511331479d90e20fab98229b5af88f2f6467b6a22b5e2d62d3c6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf",
"similarity_id": "489f8de872ec8586a445b73413d1acc5b2887f01ca8705bb09fe24719fe1441e",
"line": 107,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{priv_ins2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "7d04cba353979c81931ec8dc8453c7f89eda7f3a73bf340e271770d28ec25969",
"line": 96,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst22}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf",
"similarity_id": "54186cb138fd3b96778399f98a0d4ed49c5f66101ff1df1364da43b8e3e0e746",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive8}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf",
"similarity_id": "b06d4225f22edd2f8f5d0a2b5a1aa1c150f9dbecd30180726ad59d7d4ab3d43a",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{monitoring_negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf",
"similarity_id": "508e9eddb720ba7c083332676eaccc4971acbff151b929496d013e0abfcc277a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf",
"similarity_id": "451cd05bbda645079f06ec60029c8010c63ba9364e0a4ebcb3b102c7be2686b0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf",
"similarity_id": "a55c7aeb90b6ef5522bf23ed2037a5faacfceaad20f9155d8b5f9a1df27042bf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[ec2_instance]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf",
"similarity_id": "49fbefb0e0256a4d5d318dc6ea11da3b8d9767643546ee9f250e0d36f9e814a8",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{monitoring_positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'ebs_optimized' is set to true",
"actual_value": "'ebs_optimized' is undefined or null"
}
]
},
{
"query_name": "ELB Access Logging Disabled",
"query_id": "20018359-6fd7-4d05-ab26-d4dffccbdf79",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/elb#enabled",
"severity": "INFO",
"platform": "Terraform",
"category": "Observability",
"description": "ELB should have logging enabled to help on error investigation",
"description_id": "c745bca6",
"files": [
{
"file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf",
"similarity_id": "c01f299eb65b7e9b982121c67b2dbd5ad10537efb17267f6997749d971edd96c",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null",
"actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf",
"similarity_id": "72f3042909fd9f50409024615bec4e3b911cddbc7029f5e7ed812cb79d05af51",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[elb_http]",
"search_line": 0,
"search_value": "",
"expected_value": "'access_logs' is defined and not null",
"actual_value": "'access_logs' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf",
"similarity_id": "9f708aee741b03d2e3f52ad84e249c96d5fddbf697ca39d688fa594967812500",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null",
"actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf",
"similarity_id": "812afc05a6aaddb845238634c5159e5a1f74c5d4508f53cfa4bb3f75ad36955e",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_elb[{{positive1}}].access_logs' is defined and not null",
"actual_value": "'aws_elb[{{positive1}}].access_logs' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf",
"similarity_id": "19ab34360976fe242bf917a105df0fd039d5098eec1f3a4a8e871a291ef2f33b",
"line": 39,
"issue_type": "IncorrectValue",
"search_key": "module[elb_http].access_logs.enabled",
"search_line": 0,
"search_value": "",
"expected_value": "'access_logs.enabled' is true",
"actual_value": "'access_logs.enabled' is false"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf",
"similarity_id": "65510862ff2d16a1abb66d23df746369608870a38a654f51656ecd0a540d3e0b",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_elb[{{postive1}}].access_logs.enabled",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_elb[{{postive1}}].access_logs.enabled' is true",
"actual_value": "'aws_elb[{{postive1}}].access_logs.enabled' is false"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf",
"similarity_id": "5ad36bb73257067a7ec5b52d24a46923f9fe3adbd1b36830ba95bf1c1c5a233a",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_elb[{{negative1}}].access_logs' is defined and not null",
"actual_value": "'aws_elb[{{negative1}}].access_logs' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf",
"similarity_id": "8a57be56d39922588a43948806ad136fa13900329610adb4f3d048843a0275c3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{postive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_elb[{{postive2}}].access_logs' is defined and not null",
"actual_value": "'aws_elb[{{postive2}}].access_logs' is undefined or null"
}
]
},
{
"query_name": "Name Is Not Snake Case",
"query_id": "1e434b25-8763-4b00-a5ca-ca03b7abbb66",
"query_url": "https://www.terraform.io/docs/extend/best-practices/naming.html#naming",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "All names should follow snake case pattern.",
"description_id": "ac707cad",
"files": [
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "e285c46817744c1280bfb64d65fe9149837d658cf26c162e38eed311c7d83153",
"line": 58,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow-public-outbound-sg2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'allow-public-outbound-sg2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "bb089a95dd02b703cb65d6805c7079b1d1d19621385c8ae2fe173c1b9a0d22ec",
"line": 41,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf",
"similarity_id": "25b808efb5305a4719c04521b0c05972677d37526c195361ea82d434d3fc8ece",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf",
"similarity_id": "249367a7a16809302a505348cacca833bb8059d56f79fc38b9d3159deda6feb2",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "fb7f720e3e0c14747c960d76d42d7bc7932df44e3dd9a2694eb1c059bbe80b1a",
"line": 45,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.subnet22.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "fdc03ac8871e30598503b374f8f2f5f83f1a1f2b13bb70b5c30d70c58bb82bd4",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf",
"similarity_id": "7b3b68a918dd88d73ff549d411352e52b6d3aac64779e266d55ecfb9fb50005e",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf",
"similarity_id": "23ea1887853b7f6e594a25ebe1036bd8f183ab430fd7db729616ae6ed1683f82",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf",
"similarity_id": "1970a581a36226cb3e93ebb04ce33da66a9742209a17595912324918bc3ad332",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.positive2_1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf",
"similarity_id": "17f3644fa599067d8f76fecaa0717289aaab97ed1e6a45827911e007079d2ed9",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.web3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf",
"similarity_id": "82272bc3b87f1a706567aa6b639d890bef56e27e120db57f8941901d044e8bac",
"line": 41,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_public_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf",
"similarity_id": "f1b4d960f8ef04edf1b475c21de284bdfebf05c5d6555f481f2a698975426224",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf",
"similarity_id": "1a617967c789366f442dc5955cfb0ff806fb07b31fdec254094ef9d812c1a9cb",
"line": 29,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_codebuild_project.project-cloudrail-test",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'project-cloudrail-test' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf",
"similarity_id": "288f49cb7fdadf5884cdd0ed9d74ab1e309e072729ac652684e20fdd144b7f0c",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf",
"similarity_id": "f21800af4a95b25a989a85b4f4c68211509c0459fc43f64565422de2d7d88af5",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf",
"similarity_id": "e7afb4d47d8e8fa79af27c06e63c87971572c0e595b47c41960c2902f19e1454",
"line": 29,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_codebuild_project.project-cloudrail-test2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'project-cloudrail-test2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "0ebb40d910829f1b4ef3d61d275c7d7db992c2f1973644867455d7ba49a163ce",
"line": 83,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf",
"similarity_id": "5f74924975a4e69a7dae209cb8c429771cab9899afa60a24254ca1f25f50f21c",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf",
"similarity_id": "d8fff975a526e3c952d7c6b2ecd755705c2addc22335dbaa28c14976e6fcc6a1",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_kinesis_stream.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf",
"similarity_id": "d1e479d20e2cd542009cc3c6aada03eefae26300dc160c89347a0aebdac769e4",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf",
"similarity_id": "978614fb65b98517014164e54540fcbe864913d6f4cc1f9d5aa68f582b306e2d",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive3.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf",
"similarity_id": "9cac07f936c7f13e03ccf37276b76bc4742173102f001e87d7cf516a41cbe221",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf",
"similarity_id": "5f3eaf2862b13851be3341103d5d8cd265ac3968aabfa0ea2ad1840a774e57a1",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.userExample.tags.tag-key",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'tag-key' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf",
"similarity_id": "f5ce1190f8358062caaac0020e1aa210ec67c07ab9084e13a40cb47a590d3d6b",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf",
"similarity_id": "15ff27f01b200ecedd0a83e4e1efd6d93cf033c5c61f143b5fd8de26b4c4083b",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_snapshot.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf",
"similarity_id": "8bafdf47d66f2c7a9423bbe8242a57dd35843e3e9932bf4b34c91ae6f9d7a570",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "0c771373aa6633cf96a57199d738f9f407b141f753503dca438e839cdd678e1f",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public-subnet",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'public-subnet' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf",
"similarity_id": "8a0343d2f0b970dbd4144cbe4eca4a3388db8db7b369083e22b46584ac99ed13",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_public_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/negative1.tf",
"similarity_id": "9a40e1c74b2fe8c575b889930c74e3345026bdf2f5ff04ded847ecf4ab3e9373",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elasticsearch_domain.negative1.tags.Domain",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Domain' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf",
"similarity_id": "56eaf383e2b555fb35ab347b75a23dd4eab76f2b659d1511d67eb6b59d770113",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive6.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf",
"similarity_id": "0f5f90d5bbcad7a2d297741bd8de2ffd89a47f75f93ab65d554ae79300cf9b9e",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf",
"similarity_id": "483c2ee5e7c33df609593b73aa41ddf87a5b88233dcd4bd1505a1bd946fc4b70",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf",
"similarity_id": "cf4cb2606670e5f17c971f13a61dddf77da416578b9569852c7db5bdee1950f3",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf",
"similarity_id": "d2f1064ecb15fa4f93c25a072d0ada3c9753f2fc8ae2913bd4f877a4932e802f",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elb.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/negative.tf",
"similarity_id": "964fad8476d3a107a59f3992c753034699785ec5c1d116eea05329ac178814a7",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_api_gateway_method.negative1.request_parameters.method.request.path.proxy",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'method.request.path.proxy' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "7cd01288566af4bf2b73a6f7beebe13dd6db4d4c5b1fb83ba7c987c66e47471c",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private-rtb",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'private-rtb' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf",
"similarity_id": "f20dcbf0b8553c5b80a8f07498b2366f84fc8cf227e5a58036af46a58741321f",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf",
"similarity_id": "21afbfad8aa9bd96ccab656a78fedb404b872402df16b2077d1ca92fc3faa808",
"line": 47,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf",
"similarity_id": "dc5125fb387c566468c7b2de011e9319bdeeb7ea0c8b64f885f80c2c6daaded9",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf",
"similarity_id": "86929a4af02c4693e76fb46f89142a06d29584ca7150d3016fdb71a578df7f50",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'VPCCidr' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf",
"similarity_id": "23dc445910499a3ae192cc9eae493d42c161fc88cd589e023b16da6092461b0b",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf",
"similarity_id": "4764f67ca493c73cee064ad03fe492090f4521dd42b93c618a53e1509222acd3",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'VPCCidr' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf",
"similarity_id": "f0bc49a64609c51dab8b4e2e947cb2e6cb5841677a65b2bc38cd6f6ef98cad68",
"line": 62,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_private_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "6b9aaf6736b1ced69f0742d42b60bae52efd4eb2445342855d9982a9b0013db4",
"line": 109,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "10c4c0f6483b14a555518066c38d3b0bc22c0eb86d97a78caf238f27cfdac012",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "59afaadfea06d7788c1ff8df5bc1528b6468c3346002a4f184f4973c13b8e1c8",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "af062b913319f77ce1e0b7d7d5b8a52f75b4a1e0cd6db0125ccb16ae5b0d3ab7",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "062ce6b24d4c2a30afed15c170708b1e18fb288da53fa75ee1781feca8c51a4a",
"line": 73,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf",
"similarity_id": "803c1d13da5e73e923414a54d4e9212322c9dde9064be6e78ff64d405f22a916",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf",
"similarity_id": "5db62a45bb3a74774fededc0852114b05114a2c6cd92460f0f8504afe7a9c20e",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf",
"similarity_id": "3fe57aa9ca515ee74fa96a39512853ff4bd06de289e03d4dda430ab89ba22cdf",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf",
"similarity_id": "1c45be234ffb38de00f40157d89e4e6bf5ab3652430faeb0fbe7cabf41d98bd0",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Application' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive1.tf",
"similarity_id": "0ac4ee7ce2e003690d7ef27eb55aebfbb2ec45fa55cd552e935e69542ae89be3",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "d3dfa853b33aa00fa95ccd1e7c1847a763f28470638727e02b5ae8606853e7c7",
"line": 27,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public-rtb",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'public-rtb' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf",
"similarity_id": "9c2962f6d20b3b5623611395337d08e841cac569cedc80200fc7a0ded350ea82",
"line": 30,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf",
"similarity_id": "ab3c4c6df7b2fb13dce1fd66660eda1837da6f9b49e48d7dcda94c0b06b34f1c",
"line": 40,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf",
"similarity_id": "0342ffba90a7404e647fa73d5847228d5684b32b9a8288ed9c77e3cfe9b62c13",
"line": 61,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_private_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive3.tf",
"similarity_id": "9e1758fac03504ee175af4231201b9bd84577b5005c0750d6f53394db7c8c4a8",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_workspaces_workspace.example_3.tags.Department",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Department' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive6.tf",
"similarity_id": "fac5a2ae883f9a5c7ee3dc3a9fa5fc69cf9ae4abb71ef3237bddec87302a8e16",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "module.alb.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf",
"similarity_id": "3fe0876526bf85bf5e2f00a0d9d522d8eb01745e486404f98a7fdbbb3f49a3c5",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "2e13b0e7032957cc6e1397681b8d03076a3b00b81168bf98909a3596ad795810",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf",
"similarity_id": "6271733d11dd17a39ef84a9095012d31f0b218e357306dcdc056bdd00655363e",
"line": 36,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.positive3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf",
"similarity_id": "09d88e5fea5fa6afecbaf7b295db58fda792c1d7417f1c5d06bc55417f086026",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/positive.tf",
"similarity_id": "b6b2eb0e2dd361bbdbf853c36bffe16141ece247f8fbe9be9fa1643fc546beca",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.positive1.tags.tag-key",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'tag-key' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf",
"similarity_id": "f96178d77d96eb582284c126a1fde37e0c8223d6d63e3a580c9f0e81fba7eab2",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow_tls.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf",
"similarity_id": "bab6ba5d2e5821f229958633010fc8afea81ebd28e6507b101ca6b2fe0c68711",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "e03c7b9834666a08e592f7804026b01a9a09438a4e4433678bb7b64e982865e8",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private-rtb2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'private-rtb2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf",
"similarity_id": "bfc35e787442999874e915c313166a6205b26f4c5ea1f3e0cc9e4b9cb8b392be",
"line": 26,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user_policy_attachment.test-attach",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'test-attach' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf",
"similarity_id": "0aad00304ed7f1ab3e6814d9ac57b271e065c77dfa52d0338ab616b8c8b4dd40",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_volume.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf",
"similarity_id": "f81753071fa2fa5a6e0eb4107b9b2a9d65cec53d2a0fdc23a1e8a029c2d0de77",
"line": 47,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_role.positive2.tags.tag-key",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'tag-key' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf",
"similarity_id": "44ad5328cbb17b4693f641c4fae447d3dcdcbc36ece7436d7238626704359f8a",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.public-bucket",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'public-bucket' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf",
"similarity_id": "7464e24b389e0b20dff3e2e55c2c890c4189871e3eedf6c945570bfab96f4b59",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "d0e19663ca3507af85dc5854d92d44886b56a7ef9567774ac473d346c1986b51",
"line": 139,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf",
"similarity_id": "f9d404ccd44d8186d4ff1e40fdb7bfbb963d282b313befe49855724c12701eb9",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_efs_file_system.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf",
"similarity_id": "460de1e86a1e473da52f468c49d9852e1eab2f87ac75c4d432cb8a8a1d562604",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.positive1_1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "ff874131a1a85afc40f3d67dd2fb8c0013ccc9a260fec89b934accae44a8ffb8",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/positive.tf",
"similarity_id": "2739d53a9b5d288508d4108d8f436a71d02de5f8410fcd886717dee408915ad2",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_role.positive1.tags.tag-key",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'tag-key' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf",
"similarity_id": "ececfd2c61ac7da7d39e533fc11b0d6bd58fca58fcfe52c1e728a49d575f08d0",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf",
"similarity_id": "5ae2f209d0ae608b893133bb7cc1bf544372ef6d3a06563a7193764858663f4a",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf",
"similarity_id": "e05ba10606cfa215c5341021f319d454c7b5c602be6da75484e606a15d81a4d1",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_lambda_function.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive3.tf",
"similarity_id": "a1fa6ded2e6186d02516f69cc904b5d18404474c08a41f8fbed4bbb7db1154f8",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf",
"similarity_id": "b009ed5cec288813d215190dbb81b68fbed8aaf487cca891ac7c0f82018afcce",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elb.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf",
"similarity_id": "adcbcf40ca30b9377c0d7ca9fa0cfec9bf12ba46ef26c96eb89cbd40abacf63c",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'VPCCidr' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf",
"similarity_id": "cad72a84374ca243aa1fc49f55ff07cf2fefe9e30942204191a4f8bbe6bbeca9",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf",
"similarity_id": "534530bbaf08c1eb88cd0a31e19d768c5d5845af0606a6ab2cc6ed1a75f49940",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_volume.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf",
"similarity_id": "7d1d0d72c4e437a486d8e53d198c42b07086f3a236d2069534b4f4b6e433e9d3",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "b97f935be5ab2b2049fe438a622f062c5d7e466ed269f20b24b7bb2d7725bfc1",
"line": 109,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "c1d527f6ba832ca4340eee6001d0d5e3843b2bfea626cc87b863f9c2a2db7115",
"line": 30,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table_association.private-rtb-assoc2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'private-rtb-assoc2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf",
"similarity_id": "b7b63adb265c9b4f6b3a9e08227630a85811f19fe9c4a50c524f3d0db0894bb9",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf",
"similarity_id": "8d24d238306dd69b2aa2af36356f85ade71fdafb7093a171ce58449719480b9f",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudfront_distribution.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf",
"similarity_id": "e07ff69df6e2228fc5228e598ea4e148032ba3df7aa33109f7eb8f2a7c831efb",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_snapshot.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf",
"similarity_id": "51a02386182e012254aa94155f280208bc1955291995ce8d05f1e6efeb82c98b",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_sagemaker_endpoint_configuration.negative.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "bb5573b8a5cd318882862f7a7546ec80bd9bd6eadb186c65dc0bdae50af42ff0",
"line": 30,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'dynamodb-vpce-gw' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf",
"similarity_id": "13a6e7ab250d5a93866caf906483a6a0cbcc86aa9e5306fab7a50c7e769d595e",
"line": 41,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elb.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf",
"similarity_id": "90bd1241349c29013df87f86543d4c5338a9de2d2a089c202194529d9ac81b63",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf",
"similarity_id": "a26113c4ca1c3180f2e8ffbe6ac65e358359c93856f02bec7388e48a2517fa3e",
"line": 41,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "dd30a1007289f96867258b291021c33db43ad8bba51d196a35c8e344df8123a0",
"line": 26,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private-rtb.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf",
"similarity_id": "f402c4feca474ab16da283c95b55d68f807647a97711424b00d48b367b1e2d5a",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf",
"similarity_id": "59d8999c5b1c0b73d6287ac9db34a2c284426f63ba16487cc3ea66f48456a4fb",
"line": 24,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow_tls.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf",
"similarity_id": "9b4603fea9b0efded51619af883fadeb4ca8e2796c3cbc317fe015169899f64a",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'basic-dynamodb-table' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf",
"similarity_id": "8bc01381c550271a155106eff2a3eeb4755544bd7dedcbaf8ca5bc3961676ed2",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "0b7d3bb60db93ad3ce03d3ce5faae191a9b8917e6062e6b556b94d9a5ac2aecb",
"line": 95,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'basic-dynamodb-table2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf",
"similarity_id": "02c2d91e73e579f962a03a512d2f698f7519c0016142135cf144dec1641e729f",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_volume.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "6e59023006b47af8abb7e3a03e9e0bc42a3459c8094dc3016839b285a7a7ffbe",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf",
"similarity_id": "90d5f9615458a7d30e2749da2b8aed865dd9b83cd172729788cc64fc92d134ac",
"line": 45,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf",
"similarity_id": "f1f08f7e1d3d2646727c0cd3a4db61e62a8df136d79ba27ec120b12f56ebdc78",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative4.tf",
"similarity_id": "39e843162e5ff9727d5d6514a55d842054f346ca1d4fe5fd057a3e7fd6e3b4ac",
"line": 55,
"issue_type": "IncorrectValue",
"search_key": "module.alb.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf",
"similarity_id": "2fced3e4a432916241a8f576221a145f064e8f96afbe135e02e3c13db87f17b2",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "92fecf6fefb57bb1c1623b3f669404338bae42b864c0ff70abd51677d7340f38",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "f4d5662d26f3a08cf7ae53d520c7396f8e54b31e46789fc097737cb17897c987",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf",
"similarity_id": "115a6fa919db0caf4ba7e70576afc19be9bdf34d0616d9a5c8dbc03a17d807ac",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "3fbe4caa45c9ec45226431bd7079a423f495ae80914e00cd892e8a53f53398c4",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private-subnet2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'private-subnet2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf",
"similarity_id": "1a0a6cac6a33aa36edb8f6436c3ca1fdab04d59b15060e005906f55d46cc2711",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "output.kubeconfig-certificate-authority-data",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'kubeconfig-certificate-authority-data' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive4.tf",
"similarity_id": "16df3a8d925cc01b09f526b22a4966c2728398050fea4b15a7c056b679cfcaf0",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive2.tf",
"similarity_id": "e6f48355ee608a1a8fcdddd53787750b458f0d086ae34bfe2fcaea197476dfaa",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Domain' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf",
"similarity_id": "63865bc2a7d9cca07948892098d7b8ff70d03aace87f2f54ffe90d2d36f09897",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf",
"similarity_id": "997d79f4d6d6478069252d14b449b1d5087f94ad574f471d04ac57217222708c",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive4.tf",
"similarity_id": "1c3bbabc1e9bb856f41a354cf9e04ca2b0d2bd3e4e5264f10caa6ae175cd45ca",
"line": 55,
"issue_type": "IncorrectValue",
"search_key": "module.alb.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf",
"similarity_id": "c7ed64fbe5dc2463d7795b3170b98eceddf9e1724547e00346122d6581ea4d2f",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf",
"similarity_id": "2016ac07936cc7221690bcb2385bae2dee2d5a7b3b6f3c07c20d6baf248ee889",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "5b3f5a784fc0aa797a0c3260f6a8868e6406c3ee4fc72095c7c2bb9cfae4dc47",
"line": 120,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table9.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf",
"similarity_id": "83ab6aee6cb6bb1dc6fcc0feb95e35a92e1de5723a7b9341e22d75597bda895e",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_volume.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf",
"similarity_id": "0fc372e916ff9c31d99aa7daa6bed16fea8cb781b93d135097bd8fd3b0c2ac45",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.web.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf",
"similarity_id": "c723df32e44bc43710c9a900c165eb0fd6f6cd674f9841f3330724d87736b18d",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf",
"similarity_id": "578f053b1fe8d03db644bf8c4545334caa6e110372d800b7dd5f1046aa7eb9c5",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "9ef5b6e97b2fe73c97bd611b3670477e3fcc02087f95eef61e65c9bf9ce4c761",
"line": 43,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "1e264248f099dd9f2f1adc0d9fb46c9a6ff62217f3450f95788a52ce778d080c",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/negative.tf",
"similarity_id": "30b7a404e2378ef01afdec0521858bc08bece75f5f4b4947a1b56412f9262e38",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "data.aws_iam_policy_document.glue-example-policy2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'glue-example-policy2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive3.tf",
"similarity_id": "335517550c254c8f28ef87f90ff36d72acd5fc7584765cd49d19b91a27825df9",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_lb.positive3.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/glue_with_vulnerable_policy/test/positive.tf",
"similarity_id": "6fb51acd7dae65fe0f10b45ff3c6a1598d3b1c6e12fbfd1567bdbe47191545c7",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "data.aws_iam_policy_document.glue-example-policy",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'glue-example-policy' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf",
"similarity_id": "5435f54c7d2ab5431451961eeb20b9a840f0759e3a9eb993d6fe6e831c68357f",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Application' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf",
"similarity_id": "6c5e12fc6e4b1ef1e35b5aa7d7743c375eb00458ccab3581c2179e877ca69006",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_snapshot.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf",
"similarity_id": "4b40e2d979b4c375704860f0b6f2a242a16d68e79503b968eff4df35b035b77f",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "543566c34459dc9baed23a1e92c7a91601b3a52b4e1edc2ca2b7167cb4f0508c",
"line": 81,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "9f1561e249110a2eb98d6e0633e8014a3f466b581006039d366375a0edb2b00f",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf",
"similarity_id": "2a3b69cf0d0b38bf2e9fc9b91d3d73f7b560c2a2403b2a0a371a06b59a44fc5c",
"line": 47,
"issue_type": "IncorrectValue",
"search_key": "module.elb_http.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "0a4680c4155bf4f195e1de37443114af0af3035b8d1ee80e3359aa5c3782b413",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_policy_without_mfa/test/negative.tf",
"similarity_id": "a8bbd3aa541be1122e042e27e8a41648c0217b81a6fdcad7e4d53ededce4d28a",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.negative1.tags.tag-key",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'tag-key' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf",
"similarity_id": "df324863f861fdc996801fb27c2ac160ee953487f9dd1a3dd2c3185f9449fa47",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf",
"similarity_id": "9b80b92756cb3929f9377c92e4a78c31ffda04f50fff6677a2a67960ad261fd8",
"line": 44,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf",
"similarity_id": "4db5a0d916116da3db0c2f8b7c3d4f888da53a7118cde204a09835ba874410d4",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf",
"similarity_id": "bc08272e483de6133c3972d89d5f5cc697b73f0b174bf95d23ba83db06575d3d",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf",
"similarity_id": "6701c8c45247b00ccc38b21f4e7d58e030da5fb7a082edfac3aadbf639106830",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.b.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf",
"similarity_id": "315d35b405e64d2f728346b454b8ad3513313f1d965d40572585c59684d99a74",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive3.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf",
"similarity_id": "7e6e469548ab15c9b630d93702c192cf750af1824286216858cac6864756f8cc",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf",
"similarity_id": "e5591f70cb580b0636318377db81aa893414926a4536d1c2e2b05c83bac37453",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.b2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "52387728fb1b426381d4b03ec2945cdf30f79fa0a25586c5296d025bfb0b66ed",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "ae99cbe52e6ae4dfe3a752ff5f97c6cb479becd538a14016c156150441161af3",
"line": 64,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf",
"similarity_id": "c7f18bd787ef199d572dc295afc618c81ded903e1547f15021ce435375ccb179",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "8692f7785f63f1b48e79c635a2bf5f18ec124633ebb8e6063b373ab9ef820edd",
"line": 40,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.allow-public-outbound-nacl2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'allow-public-outbound-nacl2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/negative.tf",
"similarity_id": "dcc696a805aeffc368c853524bf2c3afe99c55bab284badd1d62710d2378de7b",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.userExample",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'userExample' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf",
"similarity_id": "2305867ad6af7819e9178eac0212185894988341e60c0f274505347e0177cc93",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf",
"similarity_id": "3be9857b94358e25ec990e4471a1758d97a8ce78a36b3345fdcdd22998960c17",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.negative2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf",
"similarity_id": "17c64cf7029f4297d715def886fe9e7d6fc33407a97919a71837b0ffab378712",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf",
"similarity_id": "8cd17122f46c7255a99d96b62bfcb258d0d6bc37a5104ec54ce074d37853d80e",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elb.postive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf",
"similarity_id": "4c3abb074b26e247e977d1b6e1f22e799ea6b0ecde5ebec8928f195120cb676b",
"line": 44,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_lambda_alias.my-lambda-alias",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'my-lambda-alias' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf",
"similarity_id": "6940f3331000184314ecd23763aa2569eec18bff94aeda9f55c8b199997b249f",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Service",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Service' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf",
"similarity_id": "d3569df7c7089bf700ace4ca9be7b1b47bdeecadc6fc087c91818bd5dc3f7853",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf",
"similarity_id": "8a8aa0027c7f559bf41b69886f952c4b6f545057a731a4d481e8d9aa3a5a6142",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.negative2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "8727cb1342900da9828e9e40ee067baad48f80c95f12015f797cb5e7dfad9865",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf",
"similarity_id": "307133df1a9eaaf2a9a894192979d5c2cce95b469c9a2843208c67ed4a4a866b",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_S3_Bucket_Policy_Change_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_S3_Bucket_Policy_Change_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf",
"similarity_id": "1c11a4e31aa27b613bdd81512eb81677a12a1bc68a12e21b4bbf1efabcd7828f",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive7.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf",
"similarity_id": "3c9eee6c40066f4208558c6dd062ef75c0527be3da1bb5dc64a943491e111810",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_lambda_function.my-lambda",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'my-lambda' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf",
"similarity_id": "4965ca7963e398ce980f95421aa1691ed34de219ebbd5aef6133eef7ef18c681",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "7b37e20d023bc73ebae63d9d915549f6a81995002e1da35b71e3f7a0761365a2",
"line": 109,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "b378c350f5429c1d55e9a741c825bc33f6d72821b22673cbfbd35b9765b7d1fb",
"line": 72,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf",
"similarity_id": "e9bfdae6edeefe5124f657ec2595fe2231da1c22544702e2dd7bbf3066fbd991",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elb.negative2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "5f1e8a7f4cf4f400779ceb78c56d1a026046038cd9216eceef633dd78a6b9d20",
"line": 65,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf",
"similarity_id": "50eb74bee9847068263b1fbaa5ec8a15be50e00083fa6c360b4c5e9a25a4f8d1",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf",
"similarity_id": "6700c65754d43b1b7c5af030cad1eda541df170f09a1148217c23c4bcb498b88",
"line": 29,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "35bc24c27cbf6028087431b2d0547aa530801c1950c5826053dc803b6aa219c7",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf",
"similarity_id": "7df1c0e324a23ee700498c6437bb4681c4269bf2549fc84f9439d760497e541d",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Application",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Application' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf",
"similarity_id": "79e320d298f675caef40d6834b51859ff7d7e5c98da3d2e5c8a7d53065371a74",
"line": 40,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf",
"similarity_id": "5bcb4cee3c5dcd2276015396ce014c7f85cdff59e25ac4d965538a23b4ab254d",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf",
"similarity_id": "90fc9819639a5011cc4680666a0181719b8e362abf1f8d5b795f871ced034d97",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow_tls.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf",
"similarity_id": "79af0142188320b4d4fa10a9c5066d0d39139c8a9cc66e21ceb5920bbcb9dec2",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf",
"similarity_id": "6313a2e3c0b81012471fed174fc95dec308473439ef257af0d6fef9453f03417",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive4.tf",
"similarity_id": "f94f311183fc69f4c6f7d065c72954e45caa8ba74be0c7ecd68009a0aac56cd2",
"line": 24,
"issue_type": "IncorrectValue",
"search_key": "module.vote_service_sg.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "5ecda317c8ca9e9703591647b06101cab2a9f099b118df11348d8295232a111e",
"line": 128,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "44fd738ac7f4d209dfd9974e416cf57f056c17267944ccd901e8d0ee47224e58",
"line": 65,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative3.tf",
"similarity_id": "26d9a4487f88cb6e51d4e86b1759678630375dcb110e734d4caa85a0febc0874",
"line": 56,
"issue_type": "IncorrectValue",
"search_key": "module.alb.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive10.tf",
"similarity_id": "a7318b1050592de8fc3fb2cc16ab17ab036a1f67aa8ed94c4e7029a7c77c44a8",
"line": 24,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf",
"similarity_id": "d7878d9eb2f59d9967676fa7f9c8a3dec90fabf418eb71a937ffccc733821448",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.b.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "b5beb5a66ad803dca65033e776c9ad4cb4ed31b71dea84a540cbefd7edd70100",
"line": 74,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf",
"similarity_id": "59c0dff398763a7cb48d138a04cf530c5fa794272e51deb6fb7c314c157d7563",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf",
"similarity_id": "c54d5238ea84469e82c1e2b2c31929dd0dd58f1e8a13ade04fe91b20e910afd9",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive6.tf",
"similarity_id": "0c34495723c23ef97668ade169f1ab09afc6672bd3dbbc8703a3d7f7a86c8b6f",
"line": 52,
"issue_type": "IncorrectValue",
"search_key": "module.alb.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf",
"similarity_id": "f7d216c761e69bf844f8c6aa738ec9a97aadcc0e3ff00bbcdf9d2336614b2ccc",
"line": 40,
"issue_type": "IncorrectValue",
"search_key": "module.elb_http.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "2a2a12e5942358a8e43406a8dd050a6cd12d81483179a5ff99e8d1cfa375043b",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "6c7ee2583e3eb7c4fce379906053297bc8079049b8d94b4c4c83155178eb4bc2",
"line": 73,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "3a1bc2ab7f01307adba959d593a03ffbb4aed82e558b8fc3c70d859c3658a5b5",
"line": 81,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "7e39d4a96d279e81daabdc90185fe295db8c3bdfea22f920a6de323b8b1cbfc0",
"line": 64,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf",
"similarity_id": "9fd3ee735208610f9635877a32761b4896e3a1a2dd3d501e8c0cf604f0e6ddf2",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf",
"similarity_id": "d2f36bdad7284e64fbeab52855ccf892db7869fa1487e48fa875327db858b8ef",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.web2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "50d6ce1290c3bdab1141c9e5f09dc16ad731c4911e52c9ea8adb8e72e47d271d",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf",
"similarity_id": "98e90a87c202ec9c754db27c109172c9cfdb9f7074d0613948a7668e65854076",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.positive1_1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf",
"similarity_id": "665065c79aae79dd43577837c58312c593ff5850e98d1073c79c48a24bb8ab7c",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.public-bucket2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'public-bucket2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "e9e1672b6892444cd56bc6806c3388762a75bcf84edd0101249dcaf2a57a7f89",
"line": 87,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.test-ec2-instance",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'test-ec2-instance' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "f0aaadf8963c5f5d97718a01354553608ee32d1420a797222c59f7d974bb1fcd",
"line": 83,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf",
"similarity_id": "2cf5c44aea2385f7cb78aece4a2df75499316cdf84446a72820f3ba2a7e6de93",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.negative2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "c71dcc8fa61cfc0acc63db2702b0a31b33bb2302c4aca82012f142677a0de253",
"line": 120,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table2.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive4.tf",
"similarity_id": "b388eeab9faa9631be82b30b45841d72c751699cb6ebb8415e6f512c4378ba60",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/negative.tf",
"similarity_id": "475dbdc0756796195e226f50f66f73246fc28d0671e0a2958dd7ed5a1a8116aa",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_kinesis_stream.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf",
"similarity_id": "c23a7f01ef82b43a0217acbe265b42e2acf278fa30f99c4bdf8ea04e6701743a",
"line": 27,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "ccfc5daf780a3789815c06fceaadf346a147dd09bb489bfeb106edb9407b3d6c",
"line": 154,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative2.tf",
"similarity_id": "38ed35d4d3a02f36700f20092c885c16472af6bc036d8a2c83d6939f4bfc3e5c",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_lb.negative2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive4.tf",
"similarity_id": "a3fcf3d04197008fb3e7f4f813613df56470885b3e251f4374834cff846fa617",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_lb.positive4.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf",
"similarity_id": "1500659d619492c204a4a0f7b322096af37cb86bf969fede192390ffc99cd619",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf",
"similarity_id": "19d10d7985021871f6033297df82ca5d22b1582839b12f5f83024c731c5cbd00",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Security_Group_Changes_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_Security_Group_Changes_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "0dbafb3a8863ff274ce05aeec673b3c1854f5616c493be6c97474f5d80d43762",
"line": 82,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf",
"similarity_id": "ae713279a1e484fbea5893a4654f8c5c8512f1309cf6c11b73c358391423fd43",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative2.tf",
"similarity_id": "fdfa2c9bbdc0bcdd6295aecb3e26bbdc0d6e54cf3e1b7bad7336c3ed4034e671",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf",
"similarity_id": "1751a09807576026912e4b78b26b8396e31e4e8734bae6b3e8b889cb5f272525",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf",
"similarity_id": "4031d9e9744797bc74017041774553f93773c80cca47b6b044fa27085038dff9",
"line": 47,
"issue_type": "IncorrectValue",
"search_key": "module.elb_http.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "47f3e04d8a0ec915b1f2e3bb3e765afbec536f003daed8102eb3dba2472d0f33",
"line": 94,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'sqs-vpc-endpoint' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "0713351a31886f46d6e90b8d94acb01ca5989eebcc800b9bed88bb5137a6b88b",
"line": 74,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf",
"similarity_id": "73edc2121b46fdc84b7d7604b925dd7cfb2256664251f054904d2d9cb707c000",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "086b60bb4f6c14c070bef48f0ccd9ee2b66850e8945a46e3e8ca597fce3cb7d2",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "2eeeaaccfbd6f5f73fbe310b3afd9a62e2608da129055470cef48297c4d3fb10",
"line": 111,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive2.tf",
"similarity_id": "3356ec5b8eb065f1eec6765e2209ac7d1c49d6d7110ae1f4aa92ee653301de42",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_workspaces_workspace.example_2.tags.Department",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Department' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "24e97704b1962ed61091f0925cbcd5bc4a5b1125e1ae2bad3a2d6fd2599d240e",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf",
"similarity_id": "ebcc61a27164a010d47be050245a8ff191b806f8fd44351885652cab1a89a9b5",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf",
"similarity_id": "32b5026c966424dbfc66fc2e49a99d954c5fc590b696474084111f9f72f19edf",
"line": 36,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.negative3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive4.tf",
"similarity_id": "61513477be63d8ba943737da51d33aa2938db14dc24c3d02a7eabfafa162fafa",
"line": 28,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "2a58b5863b6307644c7b340a03f9c9e14f231db63449673d459ad63b1da34894",
"line": 64,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf",
"similarity_id": "6fee34612052885b14eebda817edf162609452fa61ed1e8be30eb36fbd6d77bb",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive7.provisioner.remote-exec",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'remote-exec' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "e78c7b2c62dc82ca09bd6e0016271759404f4724d991198aae0de5aad8c42e06",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive2.tf",
"similarity_id": "a9ba0ddf8330288eb9998fb5f5a4f5a97322dd69d16f7e17223f37ba9bbc4cd1",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative2.tf",
"similarity_id": "26783256bab02b2d28c47d25e504869d83efce0f7204fb461df426456d5bc975",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf",
"similarity_id": "9ce5ca32d2be8cb4b5f4314a216e0e70861a8c6f1d9c2fc212d1bb78e79a6528",
"line": 40,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "786e8be1c2459e36c29182055a1667bc7341067eec4f57087c31691dc40819fa",
"line": 138,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "6a4fa4e9f565d7a4d2dc935e6d126cddf951fe3784f66a5bf0b13e0763baabcb",
"line": 64,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf",
"similarity_id": "a0553459cd189a443d1cd7551efdf928db7fdc2a22bebfd9c0cd06973d2c64ff",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "ab78a10ac9b26928b3121277a3b56019d3dd5b47dee3631356c65cf3bd057d66",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf",
"similarity_id": "9b1feb92247beb372cd45bff6bd53826f5e18a2072d08ec23a5d462d07f804e1",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_efs_file_system.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf",
"similarity_id": "17e519c8770e12effc16888f36d1cc90b28163a4be772cda3adbed539da421b4",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf",
"similarity_id": "d865634b9d7fec4f1350d46129fa0a29400c4b8eb8a60870847b87d4573ab04d",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_acm_certificate.cert_2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf",
"similarity_id": "7ba8578d93dad4cd4aca7634b4d4f7369a9ef4ac9a3c7f7a6d8fec849c813fe2",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Service",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Service' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf",
"similarity_id": "865681b89ae6bdd0b67a48a3f86045dab83880633331946003888b1ba91bccdf",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf",
"similarity_id": "a46cc9f8fd0900ff2ee0d26369a66590ba7680006f1fbbc8d7745aff62d97575",
"line": 36,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.negative3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "0145f3e78f8ba61031ac13495d6b874847d3b943ad067f8198f6a2bddd0f5574",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf",
"similarity_id": "5d09e2551e958c561c91bd38bffd0db21e18af2266dc24a40b46ba5b2b7280c8",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "9dbba7097368f4a80174261a25961e02061607a7d703a1f977f367c6fec3caa5",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.allow-public-outbound-nacl2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "bb1ad36bea3ece3f9f013a8aa9d661f3c9407ffa0f7ea46affb166fdc818fd5b",
"line": 111,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "60d6d83b0af93cefe084157529684dd4318170927e7fa8d72a2ef5fd0afd1932",
"line": 124,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "2af5a4fe03d492ddb6482cdb9ba9e466228470110b1c709a9df627577b9ae88f",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf",
"similarity_id": "0bc12158e9d52c8b79fcdfbd4a9f69491133d3c89f4047a3be5c0f1e2e797bff",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/negative.tf",
"similarity_id": "ebe2775b4765d5fcb5c839e3b2f166403e2e86b9db7aaf036bfdec4e15c5e572",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudfront_distribution.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "10c0ba75af25933a1c4becb17dfeca02ebc42834bddee2853eb47b6221821480",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.subnet1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf",
"similarity_id": "951db50c6b1762169a16b25d2c63e2903d9c2290b300d3d9a4d558b667f5e213",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow_tls.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf",
"similarity_id": "a8b7997808a56c7980cf6dc7418f3b256eadfd181d7d3a6b0b42fd8533eac280",
"line": 21,
"issue_type": "IncorrectValue",
"search_key": "output.kubeconfig-certificate-authority-data",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'kubeconfig-certificate-authority-data' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf",
"similarity_id": "535f8bcbf9da96199cad5cc9e489e6fac5655bf595e2df3a34d99dc6d270d494",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "dd38ca482ff1c6c20841317f063d6d47fdc625a0853fc6413afb8e27588d1211",
"line": 140,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive5.tf",
"similarity_id": "e6e587afaae6f76ca2f61e611d1df4a9147e7305f4060e939c936569f2bc5420",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "module.alb.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf",
"similarity_id": "3d94bca96c25d76ea9f1a5ceda19ef7731508bb0146d367d7d6880216d7bafbc",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive2.tf",
"similarity_id": "cde9a2ba0cd2d31f64b3a2e5eb3d523c9994c07d3ca85444fe485462963a71f8",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf",
"similarity_id": "93fc580f957201d5f6ff91befbffa2f245cc8a50abb18e342ccf65abc72e3131",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf",
"similarity_id": "3687bfc3f57e70c120f1f281830ea8ec2236d419e8e70ae424950647bc530872",
"line": 21,
"issue_type": "IncorrectValue",
"search_key": "output.kubeconfig-certificate-authority-data",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'kubeconfig-certificate-authority-data' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf",
"similarity_id": "8b191b4c530e73f78276ac957131c580821afeaf906b0f0a34b1264b7c37fb66",
"line": 64,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_api_gateway_integration.api_gw_int.request_templates.application/xml",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'application/xml' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "8eafcfef5ce81e94bc058735983a7b3867152a8d62c93875545957ee980284fc",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "e0cb274fe578ccba2ef9e68c45c5c8d23ae1ec259da75fca5f6a882bf1e834c2",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "d2b6898c08fd6e18d56623025f8860f938a0ff4e1b468c80b49a15a69b5390bf",
"line": 141,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "796361a3c2e697f13d5850a58bc6fe8834dc8e8d8da8d3a7bf9cd0a8dbe0c7ad",
"line": 73,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf",
"similarity_id": "0539d229456ae9a9283e17c97a519794c9c175182fe32f47820f98da7179dc0e",
"line": 19,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'VPCCidr' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "8f6ca9855836897a2d8dd2742032303594a2382820111e672053ad25cb2cd4ad",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "1fa8f748088eb81af5ef4cfc38dac2cbfacefdd3c89f0c24378719088bb2ce84",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf",
"similarity_id": "59df7a4bfb60c69399d31853f248c62c7e65c4af3ffd6ff5bd069ec7b7866b58",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "6e6970ba502f16fdb7c075665b14de7d352a766d2c46c263dd53c2935a722b7b",
"line": 109,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "a39ce5076b8c868b51c3a365f1b1200996f846b329171ea312fbd488db067a1b",
"line": 141,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "e4e52aac31400727fa2359dacc89a8f020640e8b89a5170c6fb0bf7af65c29a5",
"line": 83,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "5bccec8da5485b97289e45302101de755e8ba4e509bc839213a2dd395db0b331",
"line": 119,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table9.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive3.tf",
"similarity_id": "96048361e52f0229a1a0f007f7f87b13589536671b340eaeeadaba680b91ca7b",
"line": 24,
"issue_type": "IncorrectValue",
"search_key": "module.vote_service_sg.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive3.tf",
"similarity_id": "b01a895d3c2f78e13a0b076a3b1096b2a65cb25d98a83c6c83b1acf7f74eabf8",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "7a96583ac13c4c601573f52c5b8c4783fe96e8040e3b100963894a2678c5c3f3",
"line": 155,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "d34a1237e85bd0b8da1b0f159af81e6580e77bd1e4a96267fc73517404c96021",
"line": 82,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf",
"similarity_id": "290c24060b9368587858021c60820235b0ffb21194d5c9f9e27ffb7326b07ade",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.positive2_1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "534d52020b8b62d50f31264d52899df584867067cc5947ed2688ebe7a2d47cf9",
"line": 45,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.subnet2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "6d8e7f4e7e86c7fa5553db570235f9b572d7f8df708bd276058f8d0b66c3c136",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "1619c77ad66fc3283a13cd8215d4a0392d36fbc5f5121b22e466febfa1f11141",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative5.tf",
"similarity_id": "814bb0d304839447b58a2d7421c574c026e58c6750ec8a53d4d8bce60fdad133",
"line": 36,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf",
"similarity_id": "51e4701d93a00f6c769b722fb3f730f102f08e19ff8aaf572aef0479b37cae41",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf",
"similarity_id": "7ba565ca3aeb22afb29ccf57192052943c34243394659afe2a7bf93031eaea3b",
"line": 46,
"issue_type": "IncorrectValue",
"search_key": "module.elb_http.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "de74887682ba82a259d48ae5b4988dfbfbae18c6fadb4deb5d63bbd8c40cb7d8",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf",
"similarity_id": "05401ddc1a4c38edc2470027615a889a75c5e47b5e1b9eab15db14d8c2dfe701",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_public_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/negative.tf",
"similarity_id": "6059faf1f4de7fe0636491dee6dbbcd8083404accd85c0c04f49ea96743c47f1",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf",
"similarity_id": "4c4f88f44420d277b2a6f58b9ee814c57989b1d300cf1663f89e6020cc1aad43",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.monitoring_negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf",
"similarity_id": "b09ee313bb93c1cb09fa18a46aeb6878c3951fe7f72c96cb63ac497acb83a7c8",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "69910aa882a1c6bf4131a1f472a875059ca02027f1daafafd086c92691bb08ef",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf",
"similarity_id": "d8fda90918cabf8cd22240df33aa517aa2288f4772b41f5bb1481546c1d43851",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative2.tf",
"similarity_id": "7e41185d1103bf9b5c208e36afd3cd3df4db9d46b5af13dae2113bfbe3ca0647",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf",
"similarity_id": "247a223eb12a95581c4abca3a3404706aa8ecd13b7d0dd9c5a2799ac77157834",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf",
"similarity_id": "f1255825ef16b08d3252268918ba10d3a9a74bb214d709cfd703fc4393bd3bd9",
"line": 28,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf",
"similarity_id": "7768b79599ca82df2204d6d3e92a19b84b6938a99ed28d4ca223069edaf211f6",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "d5cc18c31b11f5629c2664d404e2dfd30081a2a7f3b085a34b74809fb394687e",
"line": 65,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf",
"similarity_id": "c18d34ca26d5a4ecb9e0c3196a7b0ddb5db68d8211d5a3d0aad033e2747559d2",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf",
"similarity_id": "661a5184a7bd067625cda25044441d4455b9871ae06b8fefb5fedef16d68652e",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf",
"similarity_id": "ccf18e0c8d730fb13c9e865646e25a4d74b1a4df4363f83f23ccd3ce4ab1c9b6",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.monitoring_positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf",
"similarity_id": "fe4d74cbe2c2b8069e87929266fec56bf8c0906b0c742064297203925b54a71d",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf",
"similarity_id": "4a9240a1c9d160524ef27c114179c4e6e70b1c62d7e3eafd3003e0c0287ec51b",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_efs_file_system.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "90fccc757a5a158b6e222b2d98ab2cb59523cfab8a273060faca15520cb63957",
"line": 64,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf",
"similarity_id": "f4a1af720b89ebe65f1d39757dadb99840aaed7b158e2b8463c146f7ae216bd8",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive1.tf",
"similarity_id": "6d9456a2b03df937a09ffdcd98a93ebb6a32fef931911ae34a0fd19882cc6524",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_workspaces_workspace.example.tags.Department",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Department' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive2.tf",
"similarity_id": "fda413158e2f207b723acdfc8d5d360ba77cbfe2f70a512f9e9aa78a3a366568",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'basic-dynamodb-table' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf",
"similarity_id": "280a685aad832b1588fb92d139adc43ecbfc827714c5eeb7e050e51da0f6b6d4",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf",
"similarity_id": "2226b388b5ed87e1f649c05fa9efcb602c73e47ca32dfa9479b4a9d757333494",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Service",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Service' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "966e241f56dc379851821623812c4d65ff9dacafb489ce07d629a17c2b72c7f7",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_AWS_Config_Change_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_AWS_Config_Change_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf",
"similarity_id": "c52f47808ac3afbce72efcf7fb9997732bd3a32888de579ea68234dcf2b5a88d",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.web.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf",
"similarity_id": "1ebe83b7020d30e1160c5b96b4cab37d9ca97a8f2881472fe36d6c4ca5f7f892",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative4.tf",
"similarity_id": "cb7d75e0c0647a3abde82049494fd1f360c5513d80554e3b77112a6f9530faee",
"line": 48,
"issue_type": "IncorrectValue",
"search_key": "module.elb_http.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive4.tf",
"similarity_id": "1e95d4994b101b5e32dc18dd60e6273947f7126b85690055781a008e9caec078",
"line": 48,
"issue_type": "IncorrectValue",
"search_key": "module.elb_http.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf",
"similarity_id": "897a1f5a3cddbcc644f9672c3015c60515a2177a95611ee43cc17a49aa68e383",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf",
"similarity_id": "0a3f149ebfa1742f94ddd4da62fd1a0252ae3b8a2ffe13823ac752bc2003d6fa",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "5e5c011c45bf992ca1c0e946ef4b4bad41051ed3f73c4209c80e0edae6ffc948",
"line": 140,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf",
"similarity_id": "ac217e2028c7c5a0ed93bf521584f165f86644f83e4272e3146b449881048783",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elasticsearch_domain.es-not-secure-policy",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'es-not-secure-policy' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf",
"similarity_id": "6845fda5f141490c132da03805391b295803f49ebe2044d974371bee395a3785",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "3c17c0b7663cf62b436e93cc64cb01465c1d907b7d2201e2e3d30b49c6d107bc",
"line": 65,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive1.tf",
"similarity_id": "22c53730bd093a452802b3c2a60e284a719960a57af699c6ef5641a9e2e54e47",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_alb.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive3.tf",
"similarity_id": "d3c5e661aaf939bab5ebb33c2cdaea62439f28215261f4e8d951764eb0898913",
"line": 41,
"issue_type": "IncorrectValue",
"search_key": "module.elb_http.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative2.tf",
"similarity_id": "c9e42c3dcdb8d4229fbfc51add88d064126d202a1f3adb480ca981e49bf21abb",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf",
"similarity_id": "3ab313038e15de5a7e6362ac4a2cd78a7e933c2fed23e85d31584572bdf9a4a6",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative4.tf",
"similarity_id": "ecc815f005003a2f9bddba2729d7baf07a5b6b9eb0d8725b76911c95c077815e",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf",
"similarity_id": "8d137c6a9b7d4287a2d55213b065d8cd48058a0b2795c3d817a1518103ad197e",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "a5594e333c1abded154035adcaea38a80433cc5662ffc6cce3979f2a286418e6",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.subnet12.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "413bd74b0ff0fcf83a19cec882d1728b4f0a7869f22ca74946edbef5858f1c3c",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/negative1.tf",
"similarity_id": "28b1ed5a657f2dc08e11d3227e8e64abecb41c026e44d12da0c8434841c0c10e",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_acm_certificate.cert.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf",
"similarity_id": "4ea82e2739203c6d392fadb0512dc76afce1468d9e8cd218673d32434c719485",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf",
"similarity_id": "996de3745e0aef295c015a3e1f387e1501402eb88d82194c741d0222f1a7c0b0",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf",
"similarity_id": "7b5a2b08e20b0176ac4532dc17a6651e22a0a3da4841b8aa5238cb2ad8197702",
"line": 62,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_private_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf",
"similarity_id": "5557f670f3bd973320cb018ab3ec77586d6407db810e337db7d5f669ca2adf3d",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "ce9b4e603f587319f6f15b26fb9e52934fd0710171487325649cbe66a8e5aaa7",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative2.tf",
"similarity_id": "54712e918be38f49acb889405d78e2fee1ea5634fe73bca90446b1b52dc9f881",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Service",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Service' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf",
"similarity_id": "a5ae0df3456797bb05983d9e53288ea82f2a989b5e5e828ea5c302459b50cc53",
"line": 61,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_private_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf",
"similarity_id": "1fa7108e9c0d97851e5894c16f036d6f16c0173bbc8f362c9565b03c4f78ec72",
"line": 30,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_kinesis_stream.positive2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "7a1d8eb9a680a4691cf0ea4015b191113d937e42be8db6bb19f29d31a7844082",
"line": 111,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative1.tf",
"similarity_id": "0f007a9455e1729085dde42e8be9a029be2af3d3db7d8fd9888c1143b22a5fe6",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf",
"similarity_id": "8e906c3c4433cff6db1ab0df4ccea9290ff8cfc5648c1aabbb2105579b7be46f",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "d13e2f8f59828e5b06b6c001dd8c13b229d8c246e982737eb35e4322d3cce292",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf",
"similarity_id": "78aa2b2c7a7ed650b37a9f3ae619936f8108c472e6979ddc79ef4dc53b812bc9",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf",
"similarity_id": "59474ac310ff3e312c3c5e83755ea79b0491ef1cb94a7e62601cab6ccb2b2bee",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "7af1a7a8f16d9ef6fa0ccb24e87415319c739625476a7333728ba8b970a4391f",
"line": 82,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "f1987bd2b09c6fec35cf39af0390e550b503b69cb9bb23d31285c65e40b8c6d6",
"line": 125,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_domain_not_encrypted_node_to_node/test/positive1.tf",
"similarity_id": "fc353689dbd5c0155f6ea75bf400d851a19605ffb291640d5256ac277626a71f",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elasticsearch_domain.positive1.tags.Domain",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Domain' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative2.tf",
"similarity_id": "1438039068adec548cb6f8d75064e329e1d47879952102b960f42318f90f1e26",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive4.tf",
"similarity_id": "14f33de475da81042f047062655adc3c7716ad3103129905df6dcd071072347d",
"line": 27,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf",
"similarity_id": "9aacb8137eb39cc4d1814e42b95d3f420f04d5e3e24ebb43ddd9d737190e6f79",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "1d350da01814403119fe99a5b56fc712d8d0a5a24e4a2c284a00e25bdccfc55c",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative5.tf",
"similarity_id": "516a01ad96287f750e48673142d11ecea1506b3158644e602b06015946792121",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "module.alb.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf",
"similarity_id": "5c93c1c5f8470842e195e36035d647281036d20e37d7064e06d7335567875011",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf",
"similarity_id": "237c385deb9a955f374d9f5cbeb1d983b299ec72916c0aae254a2ac6df91791f",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive5.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf",
"similarity_id": "6c85770e140c37d85b6cd1026f56a222e92c974e8b4436967e8586e1a6b056d4",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive9.provisioner.remote-exec",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'remote-exec' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf",
"similarity_id": "23488356cc9a8a8e583bcb9a38da6d475687fed5de19c230e88607d27d00e997",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive3.tf",
"similarity_id": "9b9bc7ef9bf98c5f140fa355a82d07fa71e0e7f57ed25854cbeaf772f9d14a18",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf",
"similarity_id": "5cd6e6ee41d5ca6b5375e464175cb57df467ba338a385134d28573bc16c58475",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "088680432b2b90e671b309f40ee800fe0f3f6c4f748dbf88daa1d8c6cacf61bc",
"line": 41,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf",
"similarity_id": "2257c7935ebeeeed7e3dca56da7ceb31b239af28dcd861f14fc904f822f8307c",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf",
"similarity_id": "4f8b88a0b5b2f97119d4110f1c7720d8498d6d649301e8d4b77b3e3165844c92",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "01ab6682483e44c8da35b270ba78316099089e1fbc636f292117f28332e423fd",
"line": 73,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf",
"similarity_id": "f9074b75bdb9a8b2c59bc02c1d69ee52d8aea5b682b12ca8864f4dfd1d780641",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf",
"similarity_id": "a9e9c79f0352a77dce970ff96b136fe437cf4361e5478cfc688e8c3533cdf24d",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_VPC_Changes_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_VPC_Changes_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "b8ed73f39cf91709def8340811684935697a0c336a51d0a5e5129673cd811711",
"line": 50,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.public-internet-sg",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'public-internet-sg' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf",
"similarity_id": "881383a3d302e15cfae862e935a261a814e35391573778a44ef9428b76614cd5",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf",
"similarity_id": "abf47f74f66d46c4593f2bd59d7a28dd7a6613e857438c8e7e4f8b1565d18da9",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "0299bce254290d328037094c61ead9d91f750e65784cfa320b877eeaa9a9e3f6",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive2.tf",
"similarity_id": "6091f7175c621413c58fc9aded221821ac189094270ab30b1695af6c93fff319",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "b4cbddbc3f08e0e04af779e43310c204b7ee87bc81cc2bfd16b2213afca79290",
"line": 111,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf",
"similarity_id": "f86ecbd26c6d6f8df31e4a23bc1624a91a261ca53039ba52ef921cd9bc1cb82c",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf",
"similarity_id": "cc1f0fb5febd0006201a1445cf2e80ceca05ccff9d628615d2a63eac807cf5f9",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "8d84148dd5aa82e6da577edde1253d026295ce33298d7a758727c8d90f032986",
"line": 128,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf",
"similarity_id": "b97b93d0e270367bd986746f55c29d644c4d1a6de1b6b974f64c591290feeadb",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive4.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf",
"similarity_id": "e25ef56461f4cfc4a35f0bfb833300a6b67317f44ed74b36b597a0a069155801",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "3a1b1207c276b30a6b7dd204dd92d69b1a6b6dc360a2bc516b0fc2f96ce6603b",
"line": 124,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf",
"similarity_id": "0e5f5dd251a8c4c3c1eed56f38e05c74fc467fdc5f3f6951c808d24816742558",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow_tls.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "8dec0ddfec290c778497e7abc4bdede17380ae014503cd7dcc68229324b5b892",
"line": 49,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.allow-public-outbound-nacl.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive11.tf",
"similarity_id": "a67ad7d78f629f07e1883705e58ae8599c0376aefd83a665523fff1b6bd93119",
"line": 19,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf",
"similarity_id": "3e3a29ad1782acf9bfd81cd185feb55c1c151144734532dc55c48cd7c25ba244",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elb.postive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf",
"similarity_id": "5ac7bf30867e4d4a7abeb2e3c7ad1ff8d5f3f730455335907c3e6e80107f78b5",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudformation_stack.positive1.parameters.VPCCidr",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'VPCCidr' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf",
"similarity_id": "0ea51b51a68437d9d04828db1aa144a786086a8fbe7dc7a0d274d4937d8c419b",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_efs_file_system.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf",
"similarity_id": "884fb8990831f55c09a918fdb3d80800b4920c806cc516368ee744f8ba111bc3",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf",
"similarity_id": "8aba5bc0efbd23ba8aea9c60850cdaeb3a835123c19afef0b92654d8ea5a7a75",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_role.lambda-role",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'lambda-role' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf",
"similarity_id": "35fa9c039f38a765fb4e599851cbe9a51b8a909e4c2181641354650b745196ce",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Service",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Service' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf",
"similarity_id": "7cd7b030b965ca46dfd68eed2aa656bf75941c7939c351d76727e4bf00d38b99",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "244c45d2cc5700749a37d9782668fbe9a1ea07ffcea1b8086f976ebe3a69c1db",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public-subnet.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "51e0b91b0ae5c7b2ba55f6e9126c084cd7c3324b703255d7f771e392ac97b868",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf",
"similarity_id": "b07ba524b51265ff7600fedc1edb1a62679b99a9dedcd14c024615068529ee0e",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf",
"similarity_id": "971ba337f9f2288085c8606f33a7efa94188e3494d0228849fc1a539d16bbc09",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf",
"similarity_id": "8385903249e281686df8366beb1be4071322a2fbfabcc8eceb8698d2ab49b5fa",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "fe5e3fffe0d67985688482b99a3a6a0b27920abfc40276a69a39bcd6244e7f5d",
"line": 125,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf",
"similarity_id": "51fdfb929f1945c31ec986b2efe7899f71788fd143e1533186b2de6820fb090b",
"line": 45,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/negative.tf",
"similarity_id": "b0f97b8b5bea6a929c0ca131bf038f85754c671a3b7ce546c0b8de26a1670350",
"line": 44,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf",
"similarity_id": "1429f2b9c1ae90284653f0fc6fd8a5f5be7c4ec53a93c0306411d9fd74ead226",
"line": 40,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative2.tf",
"similarity_id": "f8b2a8c00f824b0ddeae1b8fc9e6f4de23c7bce93b7939810691f29318d97fe3",
"line": 24,
"issue_type": "IncorrectValue",
"search_key": "module.vote_service_sg.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf",
"similarity_id": "16f99359b3c70bffb8ff5da882861157798754723126d753896f61f1e5b2e62b",
"line": 24,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow_tls.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf",
"similarity_id": "346acd27d0cbb20747438450da05d5534958b1f1a2e09e2f16b60eeaa2fc41be",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/negative.tf",
"similarity_id": "3bd234eb3fac4a5dc78db03314aff25acae0343da7ad35056d4990dac296f420",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf",
"similarity_id": "929f970c8183dd2f80758778ce519f3f1fb1ffc2f7d5e76c801fc8c91902df4e",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_volume.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf",
"similarity_id": "69bca9cd4301fad25737f3fd31ec40cd41e067663f8ef19345c5cff39fcc9b63",
"line": 19,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudformation_stack.negative2.parameters.VPCCidr",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'VPCCidr' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "755bdf17246e6570114eab6bf577ca6f70906cbb734bcf94b58c65de0a40abdc",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive3.tf",
"similarity_id": "348251ceddf3a5d54a2adcaba310895ff1bf9f065e6fbedc0197410524b59021",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf",
"similarity_id": "f0ebd8c0a709baa5e15cdd44ac726a37c823c2d9b3c216590af17a92c8aa3bf9",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "a26bac5a4a656b1b93f8504926dca938589e6deaccf955c507fa328056f160db",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private-subnet",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'private-subnet' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "96f546c328b671362308c95eb60a5058f658aa783a826fa0886030f9cacd7853",
"line": 154,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf",
"similarity_id": "85bd9583cd68b68ba4c4e1d02d691450fd67ff1205b28cf5fd0514599fcc3281",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf",
"similarity_id": "17d941f780e9b573a11195a1486e4442632d4f6316f66bcfe4fa6cbeb6ee929a",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_ebs_volume.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf",
"similarity_id": "2aa7d3da65a556a6f83955b30c3dc39b8f4a19039f62ceace153891e326ca553",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_Security_Group_Changes_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_Security_Group_Changes_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative2.tf",
"similarity_id": "3e9790f01ef4a507bf67628892de9bbe569f54a13b61988d7698d684005ad4ac",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf",
"similarity_id": "dceab47076ce6cc729e99044b4f4058afbe381bd12903408f18b52d1e825708d",
"line": 40,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf",
"similarity_id": "e8925e812be454f72e8414c984a7069d01708911ba789b1a397e2388f6513735",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "b839bf4dd2a0ba1972a53ac741044af0c29f0b2bb284e42140835f174c40672f",
"line": 103,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_sqs_queue.test-queue",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'test-queue' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf",
"similarity_id": "c01cdfc16065f5afc95f76a609b5abb14234662b6c31f4bc4465f42d461c4ca8",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf",
"similarity_id": "de4c6414194955b94a08151b094ba30deeeebb73f2baa4e43c0171ce0fce91c1",
"line": 34,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf",
"similarity_id": "4284323071233b6bc105046bd70d89a5366894f21eb165bccfa7ca671a2e3100",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf",
"similarity_id": "b342c95db84b35265b809be3ce99c8f2476be9cb1ba5e6a5feb378e06cc5cca5",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow_tls.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf",
"similarity_id": "a9ae1578fdc440251309f785aa6d04323bde53c17eaf0aeb6e40c111abc2ed4c",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.monitoring_positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive6.tf",
"similarity_id": "6e85544bf3ca1733a04cd0193415955b56352017c4a6c546085ecfa324410395",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive3.tf",
"similarity_id": "49b711336aaef0a47a4f83e67b8a9ac43dd97a6b679b3ad5b2711edab751f593",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_point_in_time_recovery_disabled/test/positive1.tf",
"similarity_id": "36ec454eb71fbafe09b93c9182ac449fcbc4365146bacd601f5e3ab4660ccccd",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'basic-dynamodb-table' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive4.tf",
"similarity_id": "73f8331c923c1a1cdbe7ed7c487277eef1535331a3a0dbad669bbaecfa396d3d",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "42f20fa8af421ac9a575c2291a3f76e5dea2b8bc9d14521986495b31812ba6ed",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_endpoint.dynamodb-vpce-gw2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'dynamodb-vpce-gw2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "7412bc25b1411dc579ff7c4a7f1e1076e2968b2ca2e0db59d0d8c53ce732ded1",
"line": 73,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/positive4.tf",
"similarity_id": "08f04d68018af2808b97ebddc74e895cb7e1658fac24d700ead7c92deb09f847",
"line": 19,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_workspaces_workspace.example_4.tags.Department",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Department' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf",
"similarity_id": "4a083d8a09cbca91dc31b3e1a878c008783b6ac4b5407f4bc74127e3728a0153",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf",
"similarity_id": "1e5d2a7cc5e055cbc2c99fbff96c21c4057b0ffa2eda8b30b7b3ff27d351fdbc",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf",
"similarity_id": "77200d3ae45d1f5673f4dfd85e3e364b5e70bc755fff5ac7b649e5ba663ecbdc",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_efs_file_system.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf",
"similarity_id": "96cc8f06f61f64abcb6d7b2c350570ee1d2cba2e13ead36e95cfa65ee3c30239",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "a308857f8fd065d1aaf0db41d4fbbd787610cbdb4b96f0212f4a49b5a72fa91b",
"line": 54,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.public.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf",
"similarity_id": "a4713dc5892d94918e91444a433f9f1faf7b88d8f2817a5965f99c28a828f7bc",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_sagemaker_endpoint_configuration.positive.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_with_open_access/test/positive.tf",
"similarity_id": "42c375462901ff2a45815aa7fafc5b05ee32f5742a4fb680736d7ab2fa849126",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_api_gateway_method.positive1.request_parameters.method.request.path.proxy",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'method.request.path.proxy' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf",
"similarity_id": "453c396ff120e84c690b7be23e2cb7453adbe7f4c0c1c79a042a68e9b3f84033",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf",
"similarity_id": "6bd0ee3ebd17cf08cd00ee69b6dbd56dd4fe3ca4ac5b410bd69ef827513c58db",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'VPCCidr' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf",
"similarity_id": "2fe696dd55f03e7f8eef154ec5dde099f469d4cef4d83aa0ba7ffb102957b930",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.positive.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "eb5533df2f2a12148cfcf4ad3f10fa62e9d7de62883c8c2e31803f998bff426a",
"line": 111,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive2.tf",
"similarity_id": "db6e59040382216283edb5e53eee761aa2b841070ffbad1debfd107fef0d6f8e",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_alb.positive2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf",
"similarity_id": "27fed3a9156d4654e316ecd8873a367b7bd9cc1294d0bc3113efcdb7d0ccdbd6",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive3.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative2.tf",
"similarity_id": "ad96a9969928025164d56f62846468d03f99b04c1eb41b1626a05fc418cf26b8",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "59cec616e1a18b2395a5e78e82ac4fb26750e4dd9853b5e0b856dcf3c6770fd3",
"line": 74,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf",
"similarity_id": "f1111e12ee7ed489204e3d10866de884356279e3073b3c9e6199babd2ac241b9",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive1.tf",
"similarity_id": "e78609b6fd0e71425961507ed22ed0cc850652d346edaba272be5d8b7b1cf572",
"line": 3,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_default_vpc.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "939c7406aa1510363b522b666a0099468cb172bf316427f5043ce26ef81ee1dd",
"line": 26,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private-rtb2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "0c4f3a5317ce6167a485c731606c043ee492c70861f8848d44e641fc0f84d2c2",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private-subnet.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf",
"similarity_id": "3bf42280dae049b4ae42514be9f750073894d04fa8692ce47acfe8dac8078ff7",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf",
"similarity_id": "bd52d6975ec405299356bf36a5a8bdece691750c1d88623230ba3e3303055d64",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive8.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf",
"similarity_id": "63b0ef5062829e4b428e2a2b7da8179ae776e04cf6c4bf29a9a775fb039aead8",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.b2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive2.tf",
"similarity_id": "c06ba30eb2aacd28485fb9992d9ecb4f8961be2f0e96921cd6a460535c696c62",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elasticsearch_domain.positive2.tags.Domain",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Domain' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_not_encrypted_with_kms/test/positive.tf",
"similarity_id": "98d6b534947abc0a21005acecda6c0cc7e92eb911eabd37c1dcb60d31ec942f8",
"line": 52,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_kinesis_stream.positive3.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "a38369fb3a5355b6d831c0729b74eeb92cbed9a8c4af110c072bf27da6bbc6d2",
"line": 43,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf",
"similarity_id": "c39b340b17d328ab3523f92110d71395356a8b5a699bd72656748be0a5f988c5",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Application",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Application' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf",
"similarity_id": "7d3196b48567e3cdf8b843b452ca3497ab68f4c79d7021d3b3f1691e1cd6bfef",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf",
"similarity_id": "8ed2747a543bc26a6c11be518a9ae865f90f79105d163bcf811dee88ba878120",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_endpoint.sqs-vpc-endpoint2",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'sqs-vpc-endpoint2' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf",
"similarity_id": "cedb60c696961f34adece5afa6d71abd2afa0efab87d411dcee08ed57f8191be",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.web.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/workspaces_workspace_volume_not_encrypted/test/negative1.tf",
"similarity_id": "7471ac636235974240303c5f89cc2a22eda718f926e99987a631bcebd84b4361",
"line": 19,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_workspaces_workspace.example.tags.Department",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Department' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf",
"similarity_id": "ea50dd827806f9b9941dfe91709dac6daa64479f8590e3053d210762e1cbfb1d",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative5.tf",
"similarity_id": "2079cf232e99edca125015d3625bf4a553a4c6bfad58170aa11279a30e8710c0",
"line": 36,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf",
"similarity_id": "3998381bbfece72857c646ffb615364f55ea6b5e628ffb41bea3ed4765f39693",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.positive9.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "3cbe90a5e5f9d7fca04c276c741668fab16371041e47ea0b6328b1600a92c7c8",
"line": 155,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "a552fa828e5b13220844efa1dc9af2bba6a16879202d7927040cb8b457132d12",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_security_group.allow-public-outbound-sg",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'allow-public-outbound-sg' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf",
"similarity_id": "e24abf92d3904ea6f742530c02085c6ce6a0185c07848524da4bfbf02cb3566e",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf",
"similarity_id": "77e497e76926f3c56e14c4d48ce0edb19a02c018899fb690f212dcb8e4b7a968",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative3.tf",
"similarity_id": "4e8832d61f3c8220a4678ad6a81cf6bb30d7c69aef032e3b5aca411659893858",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative4.tf",
"similarity_id": "c2b2a8ade073d489fc064d81d2a7f2b1a0a4e162514d402f06479ff95b7de8a4",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive4.tf",
"similarity_id": "59dd7e32da16aa09a18c6df71a4cf20b73699642f07f82c99aa263bde8bf7b68",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Service",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Service' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "031881bb4492874b6300913defab119f3370236355f55b243d89e154617d2efb",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "83432e2c53c8b9aeadd40dd82ed778d4f1daab01329bfae29d31d29a423f2e67",
"line": 90,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_dynamodb_table.basic-dynamodb-table",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'basic-dynamodb-table' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf",
"similarity_id": "33dbe35137e6431cd5f9fa9a0d11e8404bf7aae935c280620d090a71a1263cd1",
"line": 62,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf",
"similarity_id": "4f2d8819a20263f5792b87febff1219b6cf2c97ede516d69a4ebc52ae7b4d68c",
"line": 41,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_public_instance.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "e174a63f98947437c39f4708be33e855c67f03ebde8ee5c3c0c935d5d7eb3b71",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf",
"similarity_id": "4ebf726cf97dbfbbb362264bce2629bd8e7c003bc2deda0c6fc721c723b37755",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "output.kubeconfig-certificate-authority-data",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'kubeconfig-certificate-authority-data' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "85bca752ac9b3b8ccad0f9f993e91172a5f7a2d7763979244db0dc2634280a75",
"line": 82,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf",
"similarity_id": "cfdd3a66d4359735adbe4e444fbe5c4f4aa76540f26571192fe46b4f057fe0c0",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_user.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "819242a879b899ffa0cee9555afed26f2a0f1a183bd676b0351c05ae0d393569",
"line": 43,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "110dfbd065a4ea1384a903320ec95e2ed11393caa041b1c1363dde526c809856",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "09fc4b59a9f4ec84ddcffa8ef6d1fdf932733645427629ef3f0555a3252b1b04",
"line": 45,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table_association.public-rtb-assoc",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'public-rtb-assoc' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "4424916e57155cc434cbb9af97eaab909cae02db12a80a0d118450e056bd8998",
"line": 139,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/positive5.tf",
"similarity_id": "f9ab8774cbbd640225ff179f967078c17cb2ce068f2cacb9bbffe85fd7dbf6af",
"line": 56,
"issue_type": "IncorrectValue",
"search_key": "module.alb.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf",
"similarity_id": "17ac669dc753a0e818e40cf12fd235f6b5ada51ddb280cfe6d1c47ba6fd0b568",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "5f660ebe2a3f7af747379cb7eb4d15532dfddc9bf6b2a0046c379642e96f448f",
"line": 65,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive5.tf",
"similarity_id": "e74af1af9a679cdab3fa52406dcc1eccd79ca59fd5237bcb3097bb1915ea8d45",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf",
"similarity_id": "fb284e794fe6cff0fb65c8e5b25d8f724bc6ace9184fa1dc21219893f8ca2a99",
"line": 33,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf",
"similarity_id": "83da13b1e64eeb5cfde9ee9183bd9bf573e3fc42ac4a4e716378dc54de63dffc",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elb.negative1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive2.tf",
"similarity_id": "c869335e626d8f4a83f67d88fad992441847984c9bffaaac14b15e5cb6bfda51",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "module.user_queue.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf",
"similarity_id": "e5dfa07a43773831c06c73bd233327d02f2d8500d00f3cba3d10e124c8af1967",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "435517ebf7098a7a6591e655cdd0edaf087dce1b88ae05bc096135c53f918dc7",
"line": 43,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "c5e3ae193b2c7d65ef6f79dd8b7133c77552dedf207b57b2ac2bd3452378abe7",
"line": 111,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "4b24f1a5117b3c47e61bfe514fcc00fdeb17f2a2031530a147562f2d9604e3aa",
"line": 82,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf",
"similarity_id": "c471f89017099d6958b0b2a006546532a831e5916271d4a3317303d089411d29",
"line": 34,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf",
"similarity_id": "82b9d5d6f8774514a9bc79232b257f0e1def4fe06ad5c4a28a876d8e4c260cf3",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_sagemaker_notebook_instance.ni.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf",
"similarity_id": "f9de5332b5607f47780cd9e30670a59f641cf80272781596dabb777799f8bf07",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "b5a7fd1c89f081acfe52b3c65c39e44cdfef3be4b49dde0b4f0140c057f12cd5",
"line": 64,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/alb_deletion_protection_disabled/test/negative1.tf",
"similarity_id": "f69206dc3763f31f1af04ea36ad378b0b825fff61897dabe0bbbcf7558009942",
"line": 10,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_alb.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf",
"similarity_id": "9c09b17284594759e4e1cbeadb205ea4d49c35d4a9a9b2dfa0291c7fc3e81778",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "943e0501da7e97693706e63f68cb49a37623da64e1997f9987f8b13be49635f3",
"line": 42,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc1.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "a887f56cab3b06540997b3f969cca6a3cf3653b17589e58eae01e37a9423b51f",
"line": 138,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.private_route_table.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "575699d258d9c5b53d96bdc04f862d87d90ecabb8be3b2a95a68ea9175c8f16d",
"line": 83,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf",
"similarity_id": "f21ca8b17304dd763898d05c3c3d8b841ccb4e03ea45cf667bf8dc8fe2c86917",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_metric_filter.CIS_VPC_Changes_Metric_Filter",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_VPC_Changes_Metric_Filter' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "b2aed6f29d22ec9c89b7d0987ebe324bf8a5c1663a315abb9f970197e871ff60",
"line": 72,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf",
"similarity_id": "09b99e9bd1aa7f95998ecdd1816d5594381f2e741258e1ca25b0d4621dabb40a",
"line": 36,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.positive3.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf",
"similarity_id": "c48d35cce6fc791666e9872dbed0e75b16496f13b13c8e1fe1ef67594a08e548",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_efs_file_system.not_secure.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative3.tf",
"similarity_id": "7c06cce6aa5bf47817df325e8d30c5a41bb563743a46fe3f93a5ebcaad42ddca",
"line": 47,
"issue_type": "IncorrectValue",
"search_key": "module.elb_http.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf",
"similarity_id": "1d76d23dcd7f40f017b220838a13877514708e1cae2cd0aaa1a96495d45444dc",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.positive2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf",
"similarity_id": "f1e2d7018aa155626aee03ff60b590ddc43a0c8c01f0cdf50415fc46d3e844d2",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf",
"similarity_id": "6308f1c09f4f1a2c49080694884616307445d0c83e8fb726e7ad68d3daac635f",
"line": 23,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_instance.web.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive2.tf",
"similarity_id": "b2e93d03d485c97fe0358d969b678a10d865edb9d0e9770d6d4c06aaee099251",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "e3a8d019d0604242fee6fddcc6f020a29d14a5c0e1b4b3e06af77b0283ffa291",
"line": 73,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative2.tf",
"similarity_id": "8c0d2e89ea9a32d6b2bd9779aa116fa16ba3fa41b128c9870ad2f1f437e5513b",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "dce0c3ce51368c2d8224c0e3015d11bf6475f10393805d6f8c5e609062b8364d",
"line": 65,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf",
"similarity_id": "1c9145864f61e02bf7358770b06b5656caa7f32c7e60c300c5204116777c44e1",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_elb.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "7978545e23d34636cf7fd8cb04ac08190761afc582619c16eff2517c8ba78e73",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_nat_gateway.nat.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf",
"similarity_id": "c4906d9d9e48b34bdcb435bb4998a0e5bf4d701a76299abb96ed1861ee3d0eee",
"line": 13,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_Root_Account_Use_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_Root_Account_Use_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "f1da668d4d068beec42ab936262ed8c20a7f05969713cba47459e79a1dc26579",
"line": 111,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf",
"similarity_id": "8f1347c3e9ee906de14af43028242063eff022d83ec30116354cf5053b855287",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "9ed4a0099ae03998c9c9f68a17f062556c958831102604f9bc571d0cd77e5e33",
"line": 111,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "b0fce6713d19a762fc0dbb3c8d60b93061877a82004e9ef673abc190b4296e8f",
"line": 82,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_internet_gateway.igw.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative2.tf",
"similarity_id": "fdfbe5f1dc4c40874ed0afb62780c9c24aba28c4ab26e963d8fdae62c3d0b5e7",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive12.tf",
"similarity_id": "9614f8f17fcffbd9f4fe2c135b70ed432f0989336d222fe098d9a38d9c07954b",
"line": 19,
"issue_type": "IncorrectValue",
"search_key": "module.ec2_instance.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "caa26eadde0c2a8a18c028b530c37f8ba29d24236f55fcb5189e1f4fd161502a",
"line": 110,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc_peering_connection.my_peering.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf",
"similarity_id": "69a8129bf9c3027161520db6e269babe57bcacc1b326c22f11519cbf7b679536",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf",
"similarity_id": "63f9dd457a62cccc5575b12755a0bb040dea11999f0e2e591218bde4c5331a74",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_s3_bucket.positive1.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "ba94335c337eadb74fd88c73d332b0697d4f468cdfa5782c0adb4079ddd18545",
"line": 5,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.CIS_CloudWatch_LogsGroup",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_CloudWatch_LogsGroup' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cdn_configuration_is_missing/test/positive.tf",
"similarity_id": "a08c0d8514692799d1ca77e755dc9cc5d9b3a9ce3cbcc47a5ce7c5b00ff3464f",
"line": 104,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudfront_distribution.positive2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf",
"similarity_id": "d78ead0ef2f3187e592e934a20987acbfd502d94c3870fef6048c950cc5358cf",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative3.tf",
"similarity_id": "57539d55fd7928bc7812965c11a25666dc1ecf67ab045e79593eadc684dca803",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "d6be5cf2a7b8e7af547d08fe450f13d708341d129a49541f4162793402152fb7",
"line": 74,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_vpc.vpc2.tags.Project",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Project' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf",
"similarity_id": "ef717a745662f6b7af47dada20523a417c9bdc77e39001cfa4e4432d27bad4e7",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudformation_stack.negative1.parameters.VPCCidr",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'VPCCidr' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_with_full_privileges/test/negative.tf",
"similarity_id": "17c379f004bf49cdc2b697667e079fdcd71502410b5406fef85530c5ca66ec99",
"line": 22,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_role.negative1.tags.tag-key",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'tag-key' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf",
"similarity_id": "e21402fe5c2421b651e2e42826eb7e5e3e2c5277a6bd3d3580eda1e73f8f9773",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "9d5ccf4a45e6116f4848841015e4685aa7c099132d5917874f6a4d7650a69274",
"line": 119,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public_route_table2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/default_vpc_exists/test/positive2.tf",
"similarity_id": "d1e86ab3ab02b04d771934fabb03d968c9a0b2288858a4df7b2c026dd6a81d91",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "411772c66dbcf4b8153d6328b2933bcd5bc69a06576c5d14a805ad94bce7265b",
"line": 35,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_network_acl.allow-public-outbound-nacl",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'allow-public-outbound-nacl' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "4aaf805eec7747d7105dc9f24d56696159d71046f8e42aa093995eb99ba37458",
"line": 41,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_route_table.public-rtb.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "2daa3b1ad23ebbd0374fe99a1dc7b9e0253f02af5669ba87db6645da74122030",
"line": 12,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_metric_alarm.CIS_AWS_Config_Change_CW_Alarm",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'CIS_AWS_Config_Change_CW_Alarm' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf",
"similarity_id": "58ac15137abcfd8fd8c93877632f209ee2f1083c18cd921d40b1f47086674a51",
"line": 49,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_iam_policy_attachment.test-attach",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'test-attach' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "5c245006fec121466fa24e2c8f0af2eed5c6f741a9f7539f9706c861506d7f4d",
"line": 18,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_subnet.private-subnet2.tags.Name",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Name' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative4.tf",
"similarity_id": "48f8684c9a856db56f1e2bc7be347dee89fdde3bb0db344c633f296632d5fe29",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "module.vpc.tags.Terraform",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Terraform' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_log_group_not_encrypted/test/positive.tf",
"similarity_id": "063674bbee29646ef1b3796731800f024b3ded6e818a327f51392845cd048a21",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.negative1.tags.Application",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Application' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf",
"similarity_id": "7278ea934f5b3a38ecef69a14e586ac1fc23033f8172ccf1c4de807c42dae6a1",
"line": 32,
"issue_type": "IncorrectValue",
"search_key": "module.db.tags.Owner",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Owner' is not in snake case"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_without_retention_period_specified/test/positive.tf",
"similarity_id": "dd216d3f43ee7645670a1a2a52d26ab2d820575712efbbf08e43917b8f8dc4b3",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "resource.aws_cloudwatch_log_group.positive2.tags.Environment",
"search_line": 0,
"search_value": "",
"expected_value": "All names should be on snake case pattern",
"actual_value": "'Environment' is not in snake case"
}
]
},
{
"query_name": "Neptune Logging Is Disabled",
"query_id": "45cff7b6-3b80-40c1-ba7b-2cf480678bb8",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/neptune_cluster#enable_cloudwatch_logs_exports",
"severity": "INFO",
"platform": "Terraform",
"category": "Observability",
"description": "Neptune logging should be enabled",
"description_id": "eb6f1a3b",
"files": [
{
"file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf",
"similarity_id": "1c0405bb165c729dbcf6a049168924129e957282b780ae14cec0a77c49e669e9",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_neptune_cluster[{{postive2}}].enable_cloudwatch_logs_exports",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is empty"
},
{
"file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf",
"similarity_id": "74b61a0248f5b1c22247d01095ef54452124c2d50ad0fc31c2509e2ed56006d8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf",
"similarity_id": "f2e76817dd9d5dd5f97d09929c81be2730475ce362b5a3414ec2121f7d9193bb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf",
"similarity_id": "b0a23be2719bf75e259cec51212498cc32119c416b87a38465fdf426432db289",
"line": 9,
"issue_type": "IncorrectValue",
"search_key": "aws_neptune_cluster[{{postive3}}].enable_cloudwatch_logs_exports",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports should have all following values: audit",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports has the following missing values: audit"
},
{
"file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf",
"similarity_id": "2ffbb813e704578d0874665cd6275152316b23245a361dc53f27963f8d612472",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf",
"similarity_id": "3e21e261fb043b2d6fff900f0d25312e83e37cace0f03ff7a2eb19dfc496e771",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{postive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf",
"similarity_id": "a82929c622f9b84eed8cad39c223778026781554a4db8262faae485aebf9a049",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf",
"similarity_id": "3baf10ca64b00814879bfd985fd3f54c7bd7b55d8e0d3a631281caf2ba9d3065",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined"
},
{
"file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf",
"similarity_id": "7ef86c307b58cb6cd56444c65571ce0c96cbe0d814bc0c1566a734cf37e20c76",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is defined",
"actual_value": "aws_neptune_cluster.enable_cloudwatch_logs_exports is undefined"
}
]
},
{
"query_name": "Output Without Description",
"query_id": "59312e8a-a64e-41e7-a252-618533dd1ea8",
"query_url": "https://www.terraform.io/docs/language/values/outputs.html#description-output-value-documentation",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "All outputs should contain a valid description.",
"description_id": "81535d16",
"files": [
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf",
"similarity_id": "4fc7c041f58201f74de9e2bea1d2b12a94fa574fdf1c7f8979dea8fd9ec2fd5d",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "output.{{kubeconfig-certificate-authority-data}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf",
"similarity_id": "af33bc55f0f3d18bbb1363e1e83c3c8c34f4ef4ed4523c388a7951c8db38ba03",
"line": 32,
"issue_type": "MissingAttribute",
"search_key": "output.{{secret}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf",
"similarity_id": "db8ed9060a44bd2205a3542a0804a07248115b98f18cbf7467679b91fb78ec82",
"line": 43,
"issue_type": "MissingAttribute",
"search_key": "output.{{secret}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf",
"similarity_id": "06956b3babe23ecc1f80146332881287afee675a20d22a3b382f5c6fd70986e7",
"line": 43,
"issue_type": "MissingAttribute",
"search_key": "output.{{secret}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf",
"similarity_id": "cb2f8c556cbd43cd976b190bd8ae3e09d4142a923ef7cc73d4ac94cd19d6f2d4",
"line": 18,
"issue_type": "MissingAttribute",
"search_key": "output.{{endpoint}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf",
"similarity_id": "80a8e4f10d12f6b39d600bcd8c9adc0ccbd8285c063c57729c0ab20608801e7f",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "output.{{username}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive1.tf",
"similarity_id": "30428d93436ac9002bddddd66aebd9318bd538b5b7f4b233db0259ffba51d3f9",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "output.{{username}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf",
"similarity_id": "92a9771d91987231734d620433931239d578250ccac0b96ebf0e838e08be04ef",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "output.{{kubeconfig-certificate-authority-data}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf",
"similarity_id": "95be5a87221ee7f9b4a91b2f615e53de707298ea43d5e6a4504c4f8a40cca308",
"line": 32,
"issue_type": "MissingAttribute",
"search_key": "output.{{secret}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf",
"similarity_id": "e2aff156d721fd96ccea417a09049f1682e09dfe17034402412ddc62b5e33edc",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "output.{{endpoint}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf",
"similarity_id": "8b9276533071393939dd994292c0c5946e4d0223df6a424b2fd4b44aeeeefd8b",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "output.{{username}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf",
"similarity_id": "d8b9aae21ce6e4a1861e29548946e0d9772b2d374b643867ba1b7b9f6c4eaf81",
"line": 38,
"issue_type": "MissingAttribute",
"search_key": "output.{{username}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive2.tf",
"similarity_id": "7b8df4fc3d84b48b856c6fa43b6b73d0e784f325e598cfc925da2fa72c731a62",
"line": 43,
"issue_type": "MissingAttribute",
"search_key": "output.{{secret}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf",
"similarity_id": "f7a65411846649dd32cbe30226bf159b8d741db535ac4860f1fae09e79a42f55",
"line": 18,
"issue_type": "MissingAttribute",
"search_key": "output.{{endpoint}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf",
"similarity_id": "e178d35cc297562df7f46110548b666df08d7dcfc246246cf8497c0355be3432",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "output.{{endpoint}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/positive.tf",
"similarity_id": "a653c6311fd684bd2461ef1338637585d123094578fb3547c906d991348f367a",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "output.{{username}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/negative1.tf",
"similarity_id": "9ad5ea584de1abb57833710cdd574a16b7c71e326c60bee3c068ade6c68cf2cc",
"line": 42,
"issue_type": "MissingAttribute",
"search_key": "output.{{secret}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf",
"similarity_id": "d3954dc0a3f748ade565c4dd77e0bd4b68d2b5784dcad49202c866a8fbad528f",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "output.{{kubeconfig-certificate-authority-data}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf",
"similarity_id": "3216bfe89f9bf5ab2a4351a59e1addeee0bdc97d7a5d87ca6f239e23644c4b71",
"line": 32,
"issue_type": "MissingAttribute",
"search_key": "output.{{secret}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_full_permissions/test/negative.tf",
"similarity_id": "ce94234d145740edc20e7e0889b5cdd28fa626f979d909b416f8a76fd8323377",
"line": 43,
"issue_type": "MissingAttribute",
"search_key": "output.{{secret}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf",
"similarity_id": "85b64fffeb3d57265b2304fa679c516310979eca96aaa8a60978af8a7c388040",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "output.{{kubeconfig-certificate-authority-data}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
}
]
},
{
"query_name": "RDS Without Logging",
"query_id": "8d7f7b8c-6c7c-40f8-baa6-62006c6c7b56",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/db_instance#enabled_cloudwatch_logs_exports",
"severity": "INFO",
"platform": "Terraform",
"category": "Observability",
"description": "RDS does not have any kind of logger",
"description_id": "c499a58c",
"files": [
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive2.tf",
"similarity_id": "fae9533d0141a1f5f27c25c3d989d3cc13e9247278f763de1847ed01a13b4eaf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive2.tf",
"similarity_id": "9b2222c63cbd7b17ca8bf7a2b6f258a250066e38065e9ea6c5b905cc705088f8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative2.tf",
"similarity_id": "d27a4c30e24efdc30d70bc68deff163ec44739d827e984586b7e88d3f6d3fdda",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf",
"similarity_id": "6008d8166b4e4cd74c3985797ce6373bc8d1471693d45c32a65d64bdb9a9595e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive2.tf",
"similarity_id": "b0bb0c256dad02137198610fc00c38c264ec1fbd9cc9fb815818d7a72fe88a3a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf",
"similarity_id": "c345799c7b93cdd832f5c493ba89d1b6d318753a382d479d36cf6f373637723e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf",
"similarity_id": "c7f051a2a11d5293c0458b5bc4b93b7cca93f05fe75ed270dd3ae9e88190b74b",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf",
"similarity_id": "0560239b87e7432a7473e4a7a6434692e6438112029299dfcce2477dc1300db3",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative2.tf",
"similarity_id": "450de690194a193ff6ec9bd92a5cd9d638c16d9a2ee73d4ddb5172cce2be38cc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf",
"similarity_id": "ae161e836a9425e161ed99953924cef014718b78c5fcca63106c89e8610075bf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf",
"similarity_id": "ea9ab37a6e126a1cc7c1e64c3e7d1dcdadb31910f0fadace6521e763d11d1fe5",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf",
"similarity_id": "2099960e139454a018ec5237b0837cf7de6431757cd0bdfce4f841d99f6a90b0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf",
"similarity_id": "44a5d3a6e9aa75c08d153dd96bde323c36e157fdc833ea6cc29a028edafe1f13",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive2.tf",
"similarity_id": "b17f557d3a41f534d9d9693c5678a67c049d0a75cd9dc4f3f14996a123792d8a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive3.tf",
"similarity_id": "32e011d1ce59c6be9a1ff8cbef5aa13189167cf640c8df575c8f07a90bf3dea3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf",
"similarity_id": "0d27962ca3ad069e9a43cc4a8d226f224af24b06fe21b731a71cd0cd61a88461",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf",
"similarity_id": "76f3ae2fbb71026388ae30f9c3ff5b059e91ae1eb7895bc0ee2973345043343f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf",
"similarity_id": "6b236bb26377e8d80d11b922261bdcdc88b145f556179ade9581a091bf9bb298",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive3.tf",
"similarity_id": "4b341d00fef50044bc30e53de85bdb9f8f224d6600486b02b2801cc1c9c88d79",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf",
"similarity_id": "ab4ea2b0f47883fcc21ca20ce3eae27404ee77d8bf651d6638179fb647cbe139",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative2.tf",
"similarity_id": "d7edee056023452965f5799cebf6b8f1b354a2040c1c0689acda84728ade7a14",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf",
"similarity_id": "ecdcdf6a885aca6c1a6955efad12c83ee0d5eb4b3474ceb4480f1b344086cc07",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf",
"similarity_id": "da2f5c78ef84808e50853093225d89b765ed3b2c37321ed8bd063393ec2bb9eb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive2.tf",
"similarity_id": "389fff0ebe63dcb2fc3d4cef5dfd627cb8b3dc521adbe40488b3a4b1d8985661",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf",
"similarity_id": "7841895e49f3865411fe6cb8d454f699e8abf396abc62301ba78c340a7de9752",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative2.tf",
"similarity_id": "5751bb7505921720f1e5b0603c610469123896384d83ebead2158ddc6cbc822b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive3.tf",
"similarity_id": "3883937a795b21efeb982e2777e42c758a93e962f5ce6f1317a6c4e2fc5a37f0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative2.tf",
"similarity_id": "08d252bfb9ef37dc1b10148b413edef594a396479ea5384e38cb6d7b6d2a76ad",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf",
"similarity_id": "f3db60a0220d043c2456a96839f74e3937429194b44d3cbee25a8117f133c9bd",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "aws_db_instance[positive2].enabled_cloudwatch_logs_exports",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' has one or more values",
"actual_value": "'enabled_cloudwatch_logs_exports' is empty"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf",
"similarity_id": "03b5c7234d8c9806924fd3f2e6d3258543178da27008ab0258246f78a335b56b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf",
"similarity_id": "b12ed983003cbe29dd0ab54b1726cc1ee8db5c05244a78206d8ce47232fc7e7e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive3.tf",
"similarity_id": "0131772231b2e7354f3328fd1a1b466964e8182f548dc68b6ce6ec311f868258",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive4.tf",
"similarity_id": "d641947cb6edd7684192a90891b098ff9d283f0213909a6bea1c040f540c8233",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative2.tf",
"similarity_id": "2f600b61cc9f99c4fcbb6eaaf4262a918103754a4858836398f18184eb4e150d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "module[db]",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' is defined",
"actual_value": "'enabled_cloudwatch_logs_exports' is undefined"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive4.tf",
"similarity_id": "70f32821ed3dc3b831fe2dab5b4c818df3392c3f08d1d36c13e21f85e3d9ab28",
"line": 11,
"issue_type": "IncorrectValue",
"search_key": "module[db].enabled_cloudwatch_logs_exports",
"search_line": 0,
"search_value": "",
"expected_value": "'enabled_cloudwatch_logs_exports' has one or more values",
"actual_value": "'enabled_cloudwatch_logs_exports' is empty"
}
]
},
{
"query_name": "Resource Not Using Tags",
"query_id": "e38a8e0a-b88b-4902-b3fe-b0fcb17d5c10",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/guides/resource-tagging",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "AWS services resource tags are an essential part of managing components",
"description_id": "09db2d52",
"files": [
{
"file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf",
"similarity_id": "7e02e8b9c0dad3c4fcbab64886412a41ec2069f79f82b3174a452d175f999008",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{negative3}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{negative3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive3.tf",
"similarity_id": "83b2ee7077c3c1c5eedecf44c2289d7872710dc6b780112f7c1eb7a5e692d21b",
"line": 87,
"issue_type": "MissingAttribute",
"search_key": "aws_eip[{{nat}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eip[{{nat}}].tags is defined and not null",
"actual_value": "aws_eip[{{nat}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/negative1.tf",
"similarity_id": "8ca9b71db695394745d2d2b7d8a79ceb249996d8756bd7449e3c41d7896d0fe6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{postgresql}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative2.tf",
"similarity_id": "ca9ef761f3ec26ccb07d14bd4237e954ad0a4009667ebf0c94ab2f18931057a1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{negative2}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive2.tf",
"similarity_id": "2ead60d89418bd040d676dd9b82c091ebf187d0e3b57abcf94d97e1dce441e69",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_domain_name[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null",
"actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/negative.tf",
"similarity_id": "e07d18b15798e084cae85eb808b161b015d33d364a3c2267eb2a4cc92a5e862c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/negative.tf",
"similarity_id": "e2530a639493c42cd482b59c112fafdc91e90c62f1dbe0784db6afb4c56f19c8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "ba0f53d25ae87f5895a00fa8254dd9778783a90c0bd1f68e47b62b4bd7097eae",
"line": 93,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf",
"similarity_id": "e26bae590f859e175790269f07fc770a22df0007302d44e14bee7e00883b8819",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/no_stack_policy/test/positive.tf",
"similarity_id": "2a3ab4cecdcbd321696eaf03a9057c2625a1f6df278105667157ae7b31ff8721",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudformation_stack[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/efs_without_kms/test/positive.tf",
"similarity_id": "4c900b48aab13fd27a83389d1c28863c1db6541fcd3eea23b085545e762ec7b7",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_efs_file_system[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive2.tf",
"similarity_id": "a8a666752449204c1d7a68b54ad35ddee8c557877f99db7f692c57f469a71455",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive2.tf",
"similarity_id": "506fab471e61b74698da6047c53258782ecc95522b8814d115abb4de9c092735",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{test}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "ea20b106920a54c26d8511e0d6c14280d34dea902914b3ca9ab661c25c9276c1",
"line": 25,
"issue_type": "MissingAttribute",
"search_key": "aws_route_table[{{private-rtb2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_route_table[{{private-rtb2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_route_table[{{private-rtb2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf",
"similarity_id": "846840191ca1916ab5a63b75f11a0dc52ebe4722aab0b2a11ff4697240bfcc1a",
"line": 31,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{test_role}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/negative1.tf",
"similarity_id": "1b3324f7c94b6dede2dcbbac6b3e1c9b082bb215f099825d697b3a460c189d47",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf",
"similarity_id": "b3862e7d41f123f8eaedb4e8043366cf026b859163fdf23752a2b9ee65337849",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive2.tf",
"similarity_id": "1b69624c85d46670f4e61905714b5965759435d27ffe23b82287950fa86e5dcb",
"line": 34,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{postive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elb[{{postive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_elb[{{postive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "5a1da4e5ebd82f085d5063a928de0bc78c30cf758b48ccc633187fb8615eaa87",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{vpc1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null",
"actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/negative1.tf",
"similarity_id": "45c14ed492322458ff3e44a37a19979c70049fc035e8023faaa4c613f4e07525",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_dax_cluster[{{bar}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dax_cluster[{{bar}}].tags is defined and not null",
"actual_value": "aws_dax_cluster[{{bar}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/negative.tf",
"similarity_id": "7165497ae13105fd68db3206c5be60e34c0818b7dc65ce7e34827c7a1b9c89bd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_replication_group[{{example3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null",
"actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf",
"similarity_id": "00c83f43543c3c7a77d330dc5c9f986a2b9dfdd513ea21785539da20a02411a6",
"line": 47,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/positive.tf",
"similarity_id": "a68e17569ce907a9f53029de09e80e04d7576907afab4e1012b6c749605e4131",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf",
"similarity_id": "1a053758462b24cffe82cf6b2d79df4806f7bfe255a1a445edcf635dd28b291e",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_usage_plan[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null",
"actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/negative1.tf",
"similarity_id": "4f79e64c87465132270cea917f66a41d224491c3c0569f455312dde04c85e0d9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{foo}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "288628148c1dd8a1ba828981f1ec7e85e8d4a1351d55515a5f860d2f58499274",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive3.tf",
"similarity_id": "e18137ffdb26d7ead65d13b9248fb09e2b0b6c7e25b4b8647d9ffdc18f5507c9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf",
"similarity_id": "47ab5a5a4c2c84ca1706eea63347914963e30d926b97dc98c4c7d77d3f19d605",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/positive.tf",
"similarity_id": "2c9d8ab0af1a1109813eabceefc41829b6044967357f654709650c51995c47fb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudformation_stack[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive1.tf",
"similarity_id": "52ec09e42c16a3fb9cf0e75889765c16df350632a2f0383fa1ad09b94e762a52",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf",
"similarity_id": "412c119c5698f2fb69bb4dc1628d124c788d0d56bbcec2bc94ea0ff1688dd0ba",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/negative1.tf",
"similarity_id": "47923349ae643b9f667e24b018908eaa66751e657c646db0d98bb7b72b0999cb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{negative1}}].tags is defined and not null",
"actual_value": "aws_instance[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf",
"similarity_id": "fb0a937ddde6135ea46b356b1e9a1104eda37601027dbbb488fa80b174c5745d",
"line": 18,
"issue_type": "MissingAttribute",
"search_key": "aws_kinesis_firehose_delivery_stream[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is defined and not null",
"actual_value": "aws_kinesis_firehose_delivery_stream[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf",
"similarity_id": "0c27c87a464242ba6ae0ada50437f591c69d99bfedfa8e54883ad8a867f7d540",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/negative1.tf",
"similarity_id": "c7aa5bbd271945c843a80f889225b0c52a537143d7d8f61b8a4061b231a670fc",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{web}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive3.tf",
"similarity_id": "0e6741250342a3e4853e5bb37010d5dcd3549e26acbde99a3c758b83637be06e",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive3}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive3}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive3}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf",
"similarity_id": "69088c805e052e8828b9f8a7c5da05cdefba03279e82e831bc6dcab5d70f89b4",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_kinesis_firehose_delivery_stream[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is defined and not null",
"actual_value": "aws_kinesis_firehose_delivery_stream[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf",
"similarity_id": "707ab051388c646536fcfae6489c6d71ac44d197f4dd52245c1df977d66979cf",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{positive3}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf",
"similarity_id": "27e45e9167f5af6eae42515c25a31c4dc8656fff744ccdb0ff081b8240b84726",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{test}}].tags is defined and not null",
"actual_value": "aws_lb[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf",
"similarity_id": "f1d23607f865826e68c1891350de06f695e09df1dc6723d7b4161fb7a64b08b1",
"line": 33,
"issue_type": "MissingAttribute",
"search_key": "aws_organizations_policy[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_organizations_policy[{{positive3}}].tags is defined and not null",
"actual_value": "aws_organizations_policy[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive2.tf",
"similarity_id": "b201960db9397f12bafc7d0e0cfa575ef954cee092768f2675de7cb1b8d4b42a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{positive2}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "ef4bfdeaf2c14b75184e4f5f0fd9d6606770016aed273b1e58d343750ebd3025",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive4}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf",
"similarity_id": "261b3a6793d3a0d3357750aecf6f6db454a0e6c2e288d1a01568127a580bc3b1",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_efs_file_system[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_efs_file_system[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_efs_file_system[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/negative1.tf",
"similarity_id": "c71b9036b628c802f4a033cbb3966fea4ae019a4ebc1af45513cc9f6c3f1f92b",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'",
"actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf",
"similarity_id": "62212ce9e813a833d31ab11a2af38ce7f2967bed290134bd303d0033f3225d5e",
"line": 23,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/positive.tf",
"similarity_id": "393ba58777cd068ff77d916d1e4ae16a325a482688d20c0ac922ab7e71b07a50",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_usage_plan[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is defined and not null",
"actual_value": "aws_api_gateway_usage_plan[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive2.tf",
"similarity_id": "fe79e338d31195c85c51109d8fdc53894bb1b123d08323c4b9dded4692a4de2f",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf",
"similarity_id": "e531765773e296c5618ee9e4b10761c9ee2c7bcf6ddc7247fd6169089cd6bc00",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf",
"similarity_id": "2e26557e78f3f7955a5a031b7453454c52c59b0051c3f58b0fb80ca9dfd0fc4e",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "4af43f1b8061d91a858ed8034d17cd8a4d6a9d64ce50ac0eaeb2636b62529c55",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/negative.tf",
"similarity_id": "5afed49fc6a2915a402cc1fdb1b8379cb9f7cbec121e1469fa90c9be54981d5a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive3.tf",
"similarity_id": "fc5ed0e912505526f8a98a4a4e68c43c2b240982efbc64321f52bec10677cf7a",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf",
"similarity_id": "7655a9b5b1a4bbdd4cec9c8ae584d8da55eeda37bf8af9d088051f87f575dbf3",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_ami[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ami[{{positive1}}].tags is defined and not null",
"actual_value": "aws_ami[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/negative1.tf",
"similarity_id": "5e40ab8211a035efe849559bfaae1ee931356659f8325c61b22d53b9899dad16",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_domain_name[{{example4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_domain_name[{{example4}}].tags is defined and not null",
"actual_value": "aws_api_gateway_domain_name[{{example4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/negative.tf",
"similarity_id": "a421b7589e0da6b62b605a35efef550989462f21c6a304f198ef7c672b7a084a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/negative.tf",
"similarity_id": "f1cdbe8ea87c5bb5c00fbcd517b60c0d1509e0cff29131b8c5d6476de491cdf2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "eebda7e6c5c73313f77a57d81f80784ba28cdc5357c4e935444c1fdf52a861e3",
"line": 94,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is defined and not null",
"actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf",
"similarity_id": "8ef2d5c588f29eec85b7d577c725a35871e2a0fbcfc0db33ba8941a748140e92",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{foobar2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/positive.tf",
"similarity_id": "955e41d5d1d04786e98be69491b267366a92c7b8faa2c94e654f6f9c6e2623fd",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_service[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null",
"actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/negative1.tf",
"similarity_id": "d8a576c8572a4c4064a620647e262bd1ecfa49a1c5f76e4df785b2538013a662",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_globalaccelerator_accelerator[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is defined and not null",
"actual_value": "aws_globalaccelerator_accelerator[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "43c204b5408fd3fd9c95009d665de20a7acabcacaed371c1b3b10e1c379b8470",
"line": 58,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow-public-outbound-sg2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/positive.tf",
"similarity_id": "f75f94d286cb29ce4f0d1683c20de3a202303b44d10a087c1915c7c18780cccc",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{positive1}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/negative2.tf",
"similarity_id": "db1121dfe91d7df84a97592162b8a1b346a1c99233038f07dd188e94ff94720f",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf",
"similarity_id": "cfca747d5adea55d9b316fa3e9005f25c6b6615183aa964378ee99fc39080d6f",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "d9cc822320dc4d9cd025a48c3823e953f0bf29a2a784c54140bd2805104204af",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{private-subnet2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{private-subnet2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{private-subnet2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "a44b1e99b912fa54138525e2863cb045b554de9bb5fbf4308756215d8fc1e9eb",
"line": 40,
"issue_type": "MissingAttribute",
"search_key": "aws_route_table[{{public-rtb}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_route_table[{{public-rtb}}].tags has tags defined other than 'Name'",
"actual_value": "aws_route_table[{{public-rtb}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf",
"similarity_id": "0e474fccfb992b7ae8f733abeb47ba2fccb83efe04464b77f33aff2ed270d53d",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_athena_workgroup[{{example_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_athena_workgroup[{{example_2}}].tags is defined and not null",
"actual_value": "aws_athena_workgroup[{{example_2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive2.tf",
"similarity_id": "2f055d8c48923799a78012718c1fb4b21d7a0198e2f748e2b9369dca7c21ea4c",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/positive1.tf",
"similarity_id": "fcd76071826d157edb744c53ef16f40ff397cea5b9e283bbb2f86ad2de56b13d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive3.tf",
"similarity_id": "491572e75aec5c4e850d6616b246a029bff75d543dd8a81702c4535d02b94570",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{positive3}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf",
"similarity_id": "5beb0a48d845e3d7c6aa0246ea1d1db1bb2183556200c445ef71fc80f66ac600",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{negative2}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/negative1.tf",
"similarity_id": "2ae7c0015e1872e779e77bfc6edb482cebdde59b619b226f7e4868c90c559ca1",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/positive1.tf",
"similarity_id": "90b653eca86352c80beb63c96a9b2c2815b17de563861e7b4dbdb292fcd30103",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_autoscaling_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_autoscaling_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "2018e63aa198b6b898b9703f6045024f897e119dc76773e679a86c05671a9220",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/positive1.tf",
"similarity_id": "507ac4927b22bab5cdbba3395b8d8b107704c83bcab157f8c4ff308f9903e666",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/negative1.tf",
"similarity_id": "cc755e3a6cb0faf3fc6959c7d075ee518ea28ec200bbd7dc78109380336e83df",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_replication_group[{{example3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_replication_group[{{example3}}].tags is defined and not null",
"actual_value": "aws_elasticache_replication_group[{{example3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/positive.tf",
"similarity_id": "f3954aa3293229e6fcf1407295f8a41a2d56fed3893f7363b27c974a11c95cdf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_guardduty_detector[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_guardduty_detector[{{positive1}}].tags is defined and not null",
"actual_value": "aws_guardduty_detector[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf",
"similarity_id": "07fc33d5175008f9223e68b689af7a106718429a840f17a62bf4640057a13fa4",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf",
"similarity_id": "b4e386561ea6c671889c98f64a8af5fd76420e78d7c80f4d6eee70e437b45907",
"line": 28,
"issue_type": "MissingAttribute",
"search_key": "aws_kinesis_firehose_delivery_stream[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is defined and not null",
"actual_value": "aws_kinesis_firehose_delivery_stream[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "73ecb72ab2643b1a920380ff3d9323fe577f9fdf2974681b79dd3a92696d44f7",
"line": 31,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "1c75034b7ec8992d154727cfcedadf30efc13ad205721cb03e07928272f5c788",
"line": 95,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{basic-dynamodb-table2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is defined and not null",
"actual_value": "aws_dynamodb_table[{{basic-dynamodb-table2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive1.tf",
"similarity_id": "ee0fd33604f16f32ac1a4f7b6facc70bffa69fb0efd010590c501334b14182bf",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf",
"similarity_id": "27a1ee8de2c849bda4a90fa7c02856b078131b29b083c04516a95c7e3dc66b29",
"line": 99,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{pub_ins}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{pub_ins}}].tags is defined and not null",
"actual_value": "aws_instance[{{pub_ins}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative1.tf",
"similarity_id": "17ad9b83d7b4a3d06b5bb92405ece1ddbc134f5c7e1c1dd7e664391015d09e1e",
"line": 87,
"issue_type": "MissingAttribute",
"search_key": "aws_eip[{{nat}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eip[{{nat}}].tags is defined and not null",
"actual_value": "aws_eip[{{nat}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "a02625f1cedab8735b617b4585e26dc48465ee5de5ef1a69247de4a67f51206f",
"line": 44,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{subnet22}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{subnet22}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{subnet22}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "d26cf45284e13beba9999c830d57149c916133c65d0aa4ce69af33f933a66828",
"line": 48,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{allow-public-outbound-nacl}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{allow-public-outbound-nacl}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/negative.tf",
"similarity_id": "dca446c913eeb019748add566e8ddd8b512e99f4cdd83bcf9dd35f7705db22e2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf",
"similarity_id": "d14870efa711607f8ac398d279fd5fdc0f489c66711d94e86ae1e246d2a8af7d",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{positive2}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/negative.tf",
"similarity_id": "637cf29e514551b89e42850770fdd6bcd4c8aaeb631c04b9623007335030d4a8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf",
"similarity_id": "c52dfb2db823b18e0ddd8aa79bffbdd4c0fa693ea9d318a3696fd2f47f0f482b",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_api_gateway_usage_plan_associated/test/negative.tf",
"similarity_id": "06c17deb1f5198a68483522d37394e87a461143609fb912e160ba1cc8752d3ee",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_usage_plan[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null",
"actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf",
"similarity_id": "d0e0872e1a1f2e2e0cd971571a48297fdeff432a05d917236f5c53aa8bf105c5",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "5475def60eec77d37dcdb225e91c03a15467fe43c1de8f432b51fd2c0edda71c",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative2.tf",
"similarity_id": "5a54c4d0a1878c45af83a386c2da665d19976bf6d26c2b930b90851c6b483669",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "f518a7a3f94000a826ca0682ebe7ac227f0acdd2fafc5d935324d9fa2513d327",
"line": 31,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf",
"similarity_id": "76bbd2060aedeb8a192d188b52d0bb29feac2b2f335ecb56c1d8d14a3493913d",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf",
"similarity_id": "c7ce2c14447de28f6411bede0bb33bcb570d23ac01ef3469b0b7219eeb221791",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive1.tf",
"similarity_id": "94e9567976835acc7a19a63bb0a59609ffd3378cc77a3e813ffc55954f8ec4d5",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{monitoring_positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{monitoring_positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{monitoring_positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf",
"similarity_id": "5077a9e4fe0c1d954d1a0de6ed48fb4a69b72dd55ed24248f69f085db72fbdc1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf",
"similarity_id": "99d8946712aaba18a750aa58b88e1c290fa5b96892a9345fab6756a177db4575",
"line": 40,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf",
"similarity_id": "309e42594c2490c0f2e677e4186913877ec0cb62ab083e1bcbda253f15d791fc",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{codebuild}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{codebuild}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{codebuild}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf",
"similarity_id": "b74abeb63a77ea3dbbb4b49c05d8d406107ae158830d2b3c0d033737f6bb5d7c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive5}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "4e2993ad7cc3e86d8b694bb06b77a6e8d365652665ba4534dfdaad2665f83dd4",
"line": 108,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive5}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_logging_disabled/test/positive.tf",
"similarity_id": "dcca84e6f93c0b993b368dbfb5c6d89563079d538453bb10fd961fd82a342065",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/negative.tf",
"similarity_id": "23a79dd593bc28c07e6b13e8ee9d14d60066009a448ac0d2fdd66a51247c25b8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf",
"similarity_id": "59ddb8e8b17db58e3a4c0392cd11393683079052c07f47fc84f01afbf76006c3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{examplebucket}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf",
"similarity_id": "d383b5d816b06598541ba870ba46c25fd1b915bc81733a276080f3a2b21e5f2a",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf",
"similarity_id": "538330f0d7f2664e1c474b8be8f371e56a7a0abe66ad7e4a8b91f052990f7082",
"line": 29,
"issue_type": "MissingAttribute",
"search_key": "aws_codebuild_project[{{project-cloudrail-test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is defined and not null",
"actual_value": "aws_codebuild_project[{{project-cloudrail-test2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/negative.tf",
"similarity_id": "7866e25259f9f2d87c3c82d898d68de16c9f7e5aee5a2439fa61308c9ea424a4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{example2}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative2.tf",
"similarity_id": "e86228dd472c4210069763481a493272dd4f326567b2f7e0310dd02e3212040b",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{negative2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive8.tf",
"similarity_id": "9438b526285b5e564be319fca4c8dfafd2bc13d2a2cf6833fb5be9b036603fe2",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive8}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive8}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive8}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf",
"similarity_id": "372baf8662a547260c4b851dfe37f8f5916748a9fa6940912f9e1eb789821406",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cognito_user_pool[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cognito_user_pool[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cognito_user_pool[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf",
"similarity_id": "2b678d04a71c26b117b451a681b05327b9602bc49d84d2c2d82af4512ca73711",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf",
"similarity_id": "69114e3ba4c6b49283e1c3d252c56ae7761392eec19671ccf3b6577bb83b7064",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf",
"similarity_id": "b7abc5ccfc2a43db34510753654b9df1304500ddf1a11cb9e9202eb0099177f0",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_snapshot[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_snapshot[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_snapshot[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/negative.tf",
"similarity_id": "6134d78f266152ea1eb86efb67dc94da71621e290aff38f58712df8204dd7da6",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_lambda_function[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf",
"similarity_id": "c9c2a06bb033614c985547e6879e943fce89fa51eb9c0523621b1125da797668",
"line": 72,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{api_gw_stage}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{api_gw_stage}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "68bb4bb573fc3de211bb14131b734538d1e125eba670872f966d371381867f2b",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "0612a31a2e360dfb191d936f809d4eb04f86e85f50b26a995b9858f210074c76",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive3.tf",
"similarity_id": "3c5dee2890876ac461868702fcb14d5f5b0d6213b068e3936c74b4954e17762d",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/negative1.tf",
"similarity_id": "9b01035e70fcc57a6133dae0e9499e96e9a9b1ec33b240a5477bdd3f24f3da04",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[{{bar3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_autoscaling_group[{{bar3}}].tags is defined and not null",
"actual_value": "aws_autoscaling_group[{{bar3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "0892eccf773c3acc5a32709b9db5d98d9c93c4360d32d9dd61c1bdcd05a3b746",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf",
"similarity_id": "a60f6d0c12cee891cbae8682f124f21f1b5a1de700ca63b26b254ceddfe9c9a3",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf",
"similarity_id": "c7c7520fe0078890e9e5e11c5288a889850e75e567d60854cb18bea64aacfb42",
"line": 25,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{iam_for_lambda}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf",
"similarity_id": "442b2ab40fb3d888f16940b05684a88397eca0354b7f7d38dccf2cbff1534740",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{default2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{default2}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{default2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf",
"similarity_id": "5b8e8815977316ce2976ef335bb0a9025c1f88a0f28384727aee92dcd090fbf6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "e441857edcb5152531498652a102190fc5f772a5fadcf4dc5ab75108814c7ac5",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/negative.tf",
"similarity_id": "89957dd65a545357d6db77fabbde367580e4faa18ebcd71d7194f1dbbc2686b9",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_efs_file_system[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "64264ccc566144634569809fca8a21adef929e85fbf3586e6ee601d5727ed298",
"line": 95,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{inst2}}].tags is defined and not null",
"actual_value": "aws_instance[{{inst2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf",
"similarity_id": "843c4fedd84f384401a5a7ea3cd9cdf9b3b70b30c6d2ce702884519ed722648a",
"line": 52,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{test_profile}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/negative.tf",
"similarity_id": "39e23c50089bd41f8ffa563cc85f9c56a1f76e5e01d87d7772181bace60c2f03",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_task_definition[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null",
"actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf",
"similarity_id": "516773d5d8b5859d991eac0080c80d9b28cdcf5adb681f271586b16c81263ee1",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/negative1.tf",
"similarity_id": "3d1da7cd15a6d7b02324af4b7e5bacd00a121a147d5f92e83d6547b8cb29709f",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf",
"similarity_id": "17cf49b17a1709e5c93a8aec46cd423a7ed21d61d43544514951c46e553fc797",
"line": 107,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{priv_ins}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{priv_ins}}].tags is defined and not null",
"actual_value": "aws_instance[{{priv_ins}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/negative1.tf",
"similarity_id": "f8237960acefac3f8be0b1d4b940cc3af4efbcf75bc7d9dd9b437446c481b9fa",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Root_Account_Use_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf",
"similarity_id": "c66ea2898679be6a8f49c46dbc29b7e758b9dcfbfc3237fb2f0cbf47e64ef2b3",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{test_lambda}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/negative1.tf",
"similarity_id": "710b07691e7bde9b1b26e01bbef2664a7e9b4fe7aed2d53bfd39348a17cd33fc",
"line": 38,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/positive1.tf",
"similarity_id": "2bf2b16d318d6e771c4a3b91800534d22a9d43f1fd59afcd17a01c9550003c8c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{user_updates}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/negative.tf",
"similarity_id": "84ecb2f55ee0ea1f0cc8a53c34da669032d3bb8a297efd6484d64420d080b854",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{foo2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/positive.tf",
"similarity_id": "7225318b3652ec2522c66ba50759ca7e57a654f7deba0a46e5bef83c8ee10745",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{example}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/negative.tf",
"similarity_id": "d13f310a8f971dcaa803346fc79f9c4ee3d27eaa11a545b9c578f9ebe3db5fef",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{test22}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{test22}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{test22}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf",
"similarity_id": "9abd138bb7055e8c908da4c5d1ff1d4a21327b94d04f703bb31e8e4eacb1dcd9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{foo2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/negative.tf",
"similarity_id": "f93bcf6774c81663b96a5e6a1dc6caa36ccb51599e3349793ade316d6aecdc32",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_ami[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ami[{{negative1}}].tags is defined and not null",
"actual_value": "aws_ami[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/positive.tf",
"similarity_id": "76da5875b2bdb16178726827eff6205fb2d05cdf4f40db8912c2997652388393",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/negative.tf",
"similarity_id": "a17307324bf9ac6aa530e4121b4c7bb44d4fccf10d74e360686e9f4d70f3f73d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf",
"similarity_id": "3557b9ae2cc97dbf7ad7e542f6b8c901e001dad42923045b520b05ed6b186925",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf",
"similarity_id": "95c0025b8f189cd6480b4a252329e796b2af7d4f8237a63245d805c425f965a5",
"line": 19,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{positive3}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf",
"similarity_id": "1d4ba686e2deab685c57ec959739832cf756fc472732de29f0be924f140ffd21",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_flow_log[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_flow_log[{{example2}}].tags is defined and not null",
"actual_value": "aws_flow_log[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "f954d004ed4b77e24cc14306499e91c48f7258cf7afced3448ed6242f11f1869",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive1.tf",
"similarity_id": "a46e1d381344a768ea08e407395ca3d15c2d4ba8d90332925693a9fda6579bc8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf",
"similarity_id": "0e32c21f3db3c8f6a9c32c3b2cf50587d2f1b4f01af841967d7bcec08e27e81a",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf",
"similarity_id": "a0a359e3db745d85069cdd5127bbd40db1a312f1989180a1ddb5321bf90b999e",
"line": 20,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{user_two2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{user_two2}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{user_two2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf",
"similarity_id": "43462b733c1e294edfa2b23677ed0c17762a35471b4b5e226f8123a668999e4f",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_object[{{examplebucket_object}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null",
"actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/positive.tf",
"similarity_id": "b5bb99fb037fbbbf3371564928e76aad57c8d2626a2eea94f484e96a1c30bf51",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{positive2}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive1.tf",
"similarity_id": "19bb6d932ff30ced592cb6f06697c37682a279b58e2409b59072a8cebd4cb079",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{test3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{test3}}].tags is defined and not null",
"actual_value": "aws_lb[{{test3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf",
"similarity_id": "b94ee7878149d2266eec9affb8a88c4251bc5e26450df4465f576d8062edd957",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/memcached_disabled/test/positive.tf",
"similarity_id": "e256e337c953cfac68de9599eb93d8de58945c0a0f7faaf1fc5285c47a689535",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive1.tf",
"similarity_id": "e4386e5b567c7a3fa89c7ed629d9658b5f0a4ae68a907c46ab3a8f147244378d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[{{bar}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_autoscaling_group[{{bar}}].tags is defined and not null",
"actual_value": "aws_autoscaling_group[{{bar}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive1.tf",
"similarity_id": "e4428bf562f1cce5dc4e01e1e282564c7b07b36e78cba70eea41dab5698e9b13",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "d673d91073a57aac2beb5318bf56f380631c10ff3c930f679417911aef459c43",
"line": 53,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow-public-outbound-sg}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is defined and not null",
"actual_value": "aws_security_group[{{allow-public-outbound-sg}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf",
"similarity_id": "26241351b2fe0221db62a3ebfae01860d644375def6892313a17c1b03fb374b2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/negative.tf",
"similarity_id": "520685b25a49d58b2fb6405ba121ea90c9194ccfb3c9cabdba5d23cfc9805a98",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_cluster[{{foo}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null",
"actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "6defdd3e776af665deba3b46a33a2bc36385c691733b07991712de30b93503f0",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{docdb_2}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{docdb_2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "6727e76468a4c0dbf981ccd97a118f6139cdb31a806880d82106b52316a5495c",
"line": 87,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{test-ec2-instance}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{test-ec2-instance}}].tags is defined and not null",
"actual_value": "aws_instance[{{test-ec2-instance}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/negative1.tf",
"similarity_id": "3e50a4fe72a239298854ddad5333e4ff841dced5e8e623b57076ca6a5d82ca19",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive2.tf",
"similarity_id": "6b66b89fa0a866d81ac52c6ccdd86215dd497e316812e039a415e553ba7993c3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{postive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{postive2}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{postive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_without_kms/test/negative1.tf",
"similarity_id": "c0ee11714d4663de2877de6f3550c45ff097be53bcc54c636653276b5e3a374e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf",
"similarity_id": "1a7ac61dbf2e3f3b73e67b797789a23ba1b3104288c2ccaab217f4f99e03e4af",
"line": 99,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{pub_ins2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{pub_ins2}}].tags is defined and not null",
"actual_value": "aws_instance[{{pub_ins2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/positive.tf",
"similarity_id": "30b0cd90d8314294ece920e151fc44baea81d0e4360ef3c7ac1dfa63a9394694",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{positive2}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf",
"similarity_id": "1b5f4c5e90ba877785dd878c3271237bc10260a2cadb5e0fcc8920caf186a6bd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf",
"similarity_id": "4ab3beea6772677122a2dc6c098dd4da96a7f3e0a10c5a42d2c6201c1949e7ea",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{positive2}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/positive.tf",
"similarity_id": "3a23587ce8b3355c1b75300712e31ef250ff8ef9fa5c62a77a5bc6aa4d429db7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_service[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_service[{{positive1}}].tags is defined and not null",
"actual_value": "aws_ecs_service[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/positive.tf",
"similarity_id": "a2495c663f8d2f895484a0d09e450972cf56e636ca4e77683913c0df8d8c4261",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_node_group[{{positive}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_node_group[{{positive}}].tags is defined and not null",
"actual_value": "aws_eks_node_group[{{positive}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/positive1.tf",
"similarity_id": "bb260f0b6c15e5d4776cf607e75105e0fd7b43bfe410cc6eb644d23d360316cb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf",
"similarity_id": "51e2c7ba8238d45ab5f2b4c3516efd33be100d08dadcf4d55dc1b54f48998248",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf",
"similarity_id": "28c4400dc5de01434bce2c767b7ca41e50ecf3dee35407c887185daa5794a9ca",
"line": 60,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive3.tf",
"similarity_id": "11a865b89014aac57427a30218b60da173f9e366819e0e861da91eebae74ef02",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf",
"similarity_id": "aa49041cf372a5c4664e67afc090a3146b802941d3ef6d49a641ef42350a5fb8",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "41f16462e622323f76759f988bc2eabacf171e244c0ab683cd1ff2e69ea90700",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf",
"similarity_id": "d025d3a978ed9b644c36a889d84315d34d55a641bc17d8b186c6b6a12a64b269",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf",
"similarity_id": "41b2a94b87fa2d87b0818351cf71ffdce6b90c043bc2bfd556fe6d6cd49fb25d",
"line": 27,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_policy[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_policy[{{positive3}}].tags is defined and not null",
"actual_value": "aws_iam_policy[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf",
"similarity_id": "ebbb5a684f35de823edb9a0924b75a7bcde81f46c5c026ae88d87a4c7fe25938",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf",
"similarity_id": "af2ae2af5eba88d65904d4dd84875de900e6fff29ff549810479c9faf91bebaf",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive4}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf",
"similarity_id": "81f6379f028e75e24409530fcb8f85dcfbc61eb3a83cbd5ca85292ec75ff0087",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_config_config_rule[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_config_config_rule[{{negative2}}].tags is defined and not null",
"actual_value": "aws_config_config_rule[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/negative.tf",
"similarity_id": "e9191821fa3672508186a9b2724c4f2479e3db388e50b880f8567c5f2fb2f648",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{iam_for_lambda}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{iam_for_lambda}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{iam_for_lambda}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf",
"similarity_id": "0fed6d6b7242e47145d9d4e63d3d6705eab40ff144e458a276e7b566bb0a3edf",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive1.tf",
"similarity_id": "dc0cf59eb88b8d06885b3911334937bea36e37ae3cf5bd18b26e69fe1ed20a41",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "15bbf4504be572a31d0531d3de384c5a6a4f4e352347323838d18ad7552cfe9e",
"line": 44,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{subnet2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{subnet2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{subnet2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "a8f6b5184f718342a60cbb89593f2cb633f4ca178e84a33ecf3105cd4185386a",
"line": 49,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{test2}}].tags is defined and not null",
"actual_value": "aws_lb[{{test2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf",
"similarity_id": "b9ffab0e6250113b3c983e2d48110f5e8868d1e1340c9d1e343b915ff6668dfe",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/negative.tf",
"similarity_id": "6ac7704ec9dc2e567ea8eb24c92fb328e58b7cba5f85d703792f709c77662911",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_route53_zone[{{example_com}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_route53_zone[{{example_com}}].tags is defined and not null",
"actual_value": "aws_route53_zone[{{example_com}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "191c8c5756444c07dac4872af0c55ea10045ed3ef5afda326a5b8a0827ab1463",
"line": 83,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{test}}].tags is defined and not null",
"actual_value": "aws_instance[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf",
"similarity_id": "7b07904eafe81902e46a81274b15a93fde5e06d4539a7aaa9754838e8aacabc8",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{example}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_not_encrypted_at_rest/test/negative.tf",
"similarity_id": "9eb97b557154f9117f1a9458fc0808ce877be637f3794dc3f32a537bc73ea0a7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf",
"similarity_id": "1608cc1980b8f6746dde207b10d79389d26200eea50c2b0151792314f0e92bac",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative6}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative6}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative6}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf",
"similarity_id": "b448f7be1851859652f26e7c494ccd5495e7f0e75ec0d306e91d3b0c3bf3f419",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/negative1.tf",
"similarity_id": "c5fca03dd66b80605ca1913831f98800d229b5680e34168bf072de14cd9443f2",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/positive.tf",
"similarity_id": "23b677233201e3be436893d2e3788d703bb622cccf9e2c4a752b544927e35079",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{positive2}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf",
"similarity_id": "1fe5af4d7384bbb99f39916bdc159b5e765dd94bf59054c2258c815ac5145a13",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf",
"similarity_id": "1ecfa92af60fdd0a6f4bbe4c3b6e85254df9b79406100422745fc375ad2730c7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_cluster_snapshot[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_cluster_snapshot[{{positive2}}].tags is defined and not null",
"actual_value": "aws_db_cluster_snapshot[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/negative1.tf",
"similarity_id": "f1fcb93e53cae99aec8e2de3f715f280a71a3c7bff8de38124eb59199f69a6c7",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{monitoring_negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{monitoring_negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{monitoring_negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf",
"similarity_id": "cd7415f25e912e728eeda59d54e9a6bffbedae63188e111d80819f36ccab5ba1",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/iam_group_without_users/test/positive.tf",
"similarity_id": "7be94ba0431f0f6aab830e7785d9a8b6a5e4200f5b9aa24501a769d7748330b6",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{user_one2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{user_one2}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{user_one2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf",
"similarity_id": "18b470e6db26f7cf8a0dbf73cea3eb19d1111914ac6190341cd3546296aec031",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_config_config_rule[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_config_config_rule[{{positive1}}].tags is defined and not null",
"actual_value": "aws_config_config_rule[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/negative1.tf",
"similarity_id": "9401ecc37787bb6dfae15c111e059cdfe165f5fc58d3e7d6e8d08c521b2745fa",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "9d3f19e95afa6ab7e3f58c71e5e88cb53c1c08bc499482d6d435638b7450fd63",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf",
"similarity_id": "2549281003f8119ca6b95cc225206b1a798640a044ac51a59161f29716eb22c0",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_policy[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null",
"actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "e146ebefb44f84dbf3d3e4d8bb06397f0f7a05c8c964206e64a7ad3c6e81954e",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf",
"similarity_id": "35115a0fb703be0bfc5ec70b5a9b10c18e9a88a33e78067b3fb8b2ace61a6070",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_snapshot[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_snapshot[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_snapshot[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf",
"similarity_id": "bd69fe7069541454d1721579dc422f53dfa161224caba76a2adf721d9b4e059f",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_volume[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "ce159dc07ff57b6a33db159c5a8daa0513cb9f3db390fc7774e63b78ecfd4b20",
"line": 20,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{foo3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{foo3}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{foo3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf",
"similarity_id": "1ca32488ad5b7f94154241dc6cfc3d12119f62b73452427aa30f679edf9062d3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main3}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf",
"similarity_id": "f6087a04b217a7028237b8ba68b4c8434e1fa2bbe4a96c7ab4356026e3d8ba5e",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{foo2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{foo2}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{foo2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive1.tf",
"similarity_id": "929a5b0931f65c6bcc9947dc5c56b3ae6ed78be2136b941b563bb423a08f15e5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{user_updates}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{user_updates}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{user_updates}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unscanned_ecr_image/test/negative.tf",
"similarity_id": "6fb58f137ac1812edfa1233a8be4b168b1606f4a6f6f0516ac8ffa9729c38c8f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{negative1}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/amazon_mq_broker_encryption_disabled/test/negative.tf",
"similarity_id": "ad1c51ea993097ab6ccd28884eb7aaf71d62b6e7281d17a7bae2af117092bd2e",
"line": 25,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{negative2}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "f7370db98303a3141ff18f9c6d511e3064089e89208584f0b98f4ec1c688464f",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/negative1.tf",
"similarity_id": "6782bb830f9e9a243f7213948c57b8f560ad75badc3ee82d64ee75f0af2392b0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf",
"similarity_id": "256a52f1799995882084d24f4339d3e925572e6ea5b25a47e74221eff9a258e7",
"line": 62,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{positive5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{positive5}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{positive5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/negative1.tf",
"similarity_id": "a801217030d3b0e8e1d56a68e537ab4d3624801e109b07b7481202613e4e339a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "f01dd34ee0ebdb8e46ad77bf6f934da1381e2264ead0b5e0979e48e2a6a757fd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_dax_cluster[{{bar_1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dax_cluster[{{bar_1}}].tags is defined and not null",
"actual_value": "aws_dax_cluster[{{bar_1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf",
"similarity_id": "4f57ffef3e1c7732aa69af74d1886098764365d22c270e651652c13de4f8ff18",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{negative2}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/negative.tf",
"similarity_id": "f5a9b32284ce1a13571f82a88ee53934cd1ee53ea4703973725cdcdfc67340f9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive3.tf",
"similarity_id": "dfdb0c92947bbf5dbad1c647de329556bad685ab30452df4fc6e220bed6077c5",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf",
"similarity_id": "3f443c494f9e99835030d4dcb9a7c0f7c33be8251b8bf7a8a2fa6ac891b0313c",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf",
"similarity_id": "52ae3f8e3c3451225e115fcd134e9f83385a3670e2a15b43332737193e90584c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/positive.tf",
"similarity_id": "d5b2b99ce705bd8dcfa7dc7a6d12d75f460a552e1a2249de14597ec8f0ad8951",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf",
"similarity_id": "f3fceac98bb569fa5857a123dbaf945d7f03bb0ee9587f5e8bec5ea9137e43b3",
"line": 41,
"issue_type": "MissingAttribute",
"search_key": "aws_batch_job_definition[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_batch_job_definition[{{negative2}}].tags is defined and not null",
"actual_value": "aws_batch_job_definition[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative1.tf",
"similarity_id": "d8a0693cfd4cf7e844b6ba3ad94122c93ee5a7bb122facb4b67210ef47f99ef3",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/negative.tf",
"similarity_id": "074491364f9ad692e9ffb7a0bbb3cd753236fb964ef7a848a120fd8529f31ea5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_secretsmanager_secret[{{test222}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_secretsmanager_secret[{{test222}}].tags is defined and not null",
"actual_value": "aws_secretsmanager_secret[{{test222}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "7e3a40cb27977449a7ef70d4fc5586a8829c3e57af1f2da1ad44a82805098c7c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive1.tf",
"similarity_id": "089fedfc5231f261a14c640a619a2dc70faadba71fc7e862feedac01f4837409",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "db141d0358b8679375cddf94f05ccb8bc0144a995bcc4b7e09ff8e51ac58be82",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main2}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/positive2.tf",
"similarity_id": "8e556c15562a49823de6a25f3eec6d22fb8b68338b52e15b3218c0624791c732",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{test}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative2.tf",
"similarity_id": "f5c9e50ebb49a1ffd397ce6c22a6e150390a73204c52399ed624b57e7aa34ec2",
"line": 41,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{negative2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elb[{{negative2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_elb[{{negative2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/policy_without_principal/test/positive.tf",
"similarity_id": "bfffdb27fa9f3e45e177bf16c82a3e88e244f15087f216b61499d8f0e3149fec",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{secure_policy}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive2.tf",
"similarity_id": "ab8eab0cb98609ef178f433a70dc3b485c0cab66c7aff3b5593136712797cc5a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{foo2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{foo2}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{foo2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/efs_not_encrypted/test/positive.tf",
"similarity_id": "a896de7a4488ecf4ed2bf7e17c50dbc5cbe80d6cf0ec7e7cceb8baf4e82d225c",
"line": 4,
"issue_type": "MissingAttribute",
"search_key": "aws_efs_file_system[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_efs_file_system[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_efs_file_system[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/negative.tf",
"similarity_id": "fe8bbf056f8e1eaeb140ee0a975f35d08de2c5f5d6ea7e8d4065fd6a8a0d0e9f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{a3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{a3}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{a3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_not_encrypted/test/positive.tf",
"similarity_id": "94dc443d27fbc47d48d7d0f50817d22dd65d178d0b8946fb1a97a274e971ce0e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{foo}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "9be047f91eece591d1cd2d86edde0f580f939f598cd60078bfcfc0822aedae83",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative1.tf",
"similarity_id": "53d8c436c5b634d5cb3630cdc4048c9794fa7100230f8e44d70f3ff017774d27",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "2ff28c577eff196a80ab496316ed36febbc4702c0c92c217d914660582f9f12e",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf",
"similarity_id": "a0ef527b8f5a4c9da41f6df6680b8a157b2091de30f9a420eafff52c43249ea4",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive4.tf",
"similarity_id": "1fd37b8860d1f339cb5d0d820ec3260b8c4639fa05b1770300b0ae516a648cf6",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/positive.tf",
"similarity_id": "550dcab908a48e620a069757ad535ddfa85cae49e434b6701b71701618daba62",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_elb[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cmk_is_unusable/test/positive.tf",
"similarity_id": "7a54f0b140c53b9242768caeacc140e9b9bd756da99bb1bd236fb73c2cf18837",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{a}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{a}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{a}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf",
"similarity_id": "f12c48458e5bc5cb2eecd9ec943e9d8d53dfd65e348e7791677e7566749821c3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive1.tf",
"similarity_id": "14c46b7016c799a7a79d6b9fd0c32401ee2a4e8f56e52c3ea8fe10e6a5dec483",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{postive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{postive1}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{postive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf",
"similarity_id": "78dec2f0e074b6cec468b0ff31be7171fcf42fa167f12b6c8fa1a113f8218105",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{negative4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{negative4}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{negative4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive2.tf",
"similarity_id": "64f9436143b49a3cf72a64a21beca85fb87ee7ac556b100632cccaa9eb50c3d4",
"line": 47,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{foobar}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive2.tf",
"similarity_id": "cc27a71dba8d3b20087863d9f76e10b9581a6f053045764787c56ea8bcb88918",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "70be704f4d515b1af9b96aa53f4b8fe78bd517f408650bc4696e5354843af829",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive1.tf",
"similarity_id": "a74a6b1dea11536b8957c3d826d47ec0d7893e6abfed5b40199993fb901d025f",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{web}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/positive3.tf",
"similarity_id": "f3dfdcfe5c459cbc66bc44e4c52ed68ca4c1d8e010aa1b6c05c441db362d0a1f",
"line": 35,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{positive3}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf",
"similarity_id": "edf1c643f1e8f2a3e75e53c218e04edd1058309964c1b37046571705c61cd3ea",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive2.tf",
"similarity_id": "b84eadb69e074ef9f6552414382df8510eccd16a7ca46d078cc86a10894b071c",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_root_account_use_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/positive.tf",
"similarity_id": "851997d62c5d82575badd2bab62ee9cb016e425de931885c861b1c6a38d6cef7",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf",
"similarity_id": "1a646a74d98d1c6836ff2378ae3835e681cb56f8e396b56ff36cb93a5f0c0779",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative1.tf",
"similarity_id": "f3d4e6294e9c2c7a0ad0fdf7038a7762db61afb3b3024e79b872941da5d83976",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{test33}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{test33}}].tags is defined and not null",
"actual_value": "aws_lb[{{test33}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf",
"similarity_id": "ce74423a5ebdb6b7fada8003325efb68fa78a83a3d8ef519ad493e4c95fd579e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{examplebucket}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{examplebucket}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{examplebucket}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf",
"similarity_id": "51066425f3c3795ca8f7efdb30faf8626bcf26a0265fbf4565df041d85ba94ec",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{postive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{postive1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{postive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf",
"similarity_id": "3c55eb5b2a80ba26ca8af0a47c1b6f9d4e15ea53a58a245bb1b519f3dbf97bda",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive2.tf",
"similarity_id": "f32295d4e6444ca1ee2172e3411c8e4e5921b2bdc74204e8b04f92d41b5e24b0",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf",
"similarity_id": "327e15f99b01b0ae66997060af16201647261f4a32185c6ac602f9edacd86f15",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{user}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{user}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{user}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ca_certificate_identifier_is_outdated/test/positive1.tf",
"similarity_id": "e823d8a156d0f07f9b6dcd1e7a73cd2a074a80f86f249e8eaf8af68b2d43485e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "13e7a8f2e43cea0687127698852b3b21d39fa1fcb53e20f59a1e0f9934d56c6f",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_encrypted_with_aws_managed_key/test/negative.tf",
"similarity_id": "4aed886ca8ba5f772742ec213f79274b108c258cea7b8bd769e2fc8c82fb805c",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/negative.tf",
"similarity_id": "37ea5262ecc508ffbe423bfcf90f00f3aadf676432f1370f499c0fba936ed05b",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_sagemaker_endpoint_configuration[{{negative}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has tags defined other than 'Name'",
"actual_value": "aws_sagemaker_endpoint_configuration[{{negative}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive1.tf",
"similarity_id": "76b5c89a698a4c22bd328d64028cdc5ed46602ae94ac6f0e7ab2e6e3600264f1",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_volume[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_volume[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_volume[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/eks_node_group_remote_access_disabled/test/negative.tf",
"similarity_id": "7e30d1c222fc45220644d624bcd0567c473f44512ef1c4074b946b80304cc291",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_node_group[{{negative}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_node_group[{{negative}}].tags is defined and not null",
"actual_value": "aws_eks_node_group[{{negative}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive2.tf",
"similarity_id": "fd5d638af2b36f88ab03e0f50160b7d6e7186cc2238ede0eead63c9d9b0f3e13",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ssm_document[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ssm_document[{{positive2}}].tags is defined and not null",
"actual_value": "aws_ssm_document[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/negative.tf",
"similarity_id": "02aa15a78e3a1fce9d1bbe9514ff43f4629962a53e8bdb4caf1a719de3339781",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_elb[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_xray_disabled/test/positive.tf",
"similarity_id": "2d2272715a1892aa4140c5c56a4e67189e557c5d4a4f18904e9e67e70c01bd7e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/negative.tf",
"similarity_id": "450ad3925bf7c7c081215d0b88df9d5f962abebf0206d854197fd7ccc953344e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/negative.tf",
"similarity_id": "947a65993ec3259f766561b26e41910d543a4adf8de4beeb07e974fdac4643d0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_secretsmanager_secret[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_secretsmanager_secret[{{example2}}].tags is defined and not null",
"actual_value": "aws_secretsmanager_secret[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative2.tf",
"similarity_id": "190c94b0b2b24113def0cf693efef28e6860874ea48660fee11e5f47c3bb316c",
"line": 86,
"issue_type": "MissingAttribute",
"search_key": "aws_eip[{{nat}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eip[{{nat}}].tags is defined and not null",
"actual_value": "aws_eip[{{nat}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "e8f71c54fa498ad3a80065100e1ee29c295967824429b5e38b6d3817d2718234",
"line": 34,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{subnet1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{subnet1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{subnet1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative3.tf",
"similarity_id": "6fb74ea6de2af993798d4f278ca4adfde850464f08e95a13833e4b5b7c2f9773",
"line": 35,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{negative3}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "d9d6421ac4b66f63d0eb549514f4d5f02e2b704cbaa39ad5ae8e11b96a55a11b",
"line": 88,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{test2}}].tags is defined and not null",
"actual_value": "aws_instance[{{test2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive4.tf",
"similarity_id": "940f7acd0bd8010cd1c9fa38593d16ff539c7cfd2b30c61b4e29afd7a49220eb",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive1.tf",
"similarity_id": "a2ff8df06c57aa62a69b0448eb1570586231ff4b1980f4b85f4c0b4307eb2f37",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_replication_group[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null",
"actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/positive1.tf",
"similarity_id": "1e645af2229e581d6ccbfc984e69ec8f13ed33dc79daf3c64493c0a2395d4feb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ssm_document[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ssm_document[{{positive1}}].tags is defined and not null",
"actual_value": "aws_ssm_document[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/positive.tf",
"similarity_id": "44cf75869f027a88fc9cd12be7cb3ec7a053ed68145258479930d13fbc572c53",
"line": 29,
"issue_type": "MissingAttribute",
"search_key": "aws_codebuild_project[{{project-cloudrail-test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is defined and not null",
"actual_value": "aws_codebuild_project[{{project-cloudrail-test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive2.tf",
"similarity_id": "48ad1912be1a7c206f989c2f90f8c4ad7b04223a6e0f487a15251cf8766e76fa",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{example2}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "319c999a711e159ac5e65b7dfa8afa97b7171d0efd4c99b236da88b619dea086",
"line": 106,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive8}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive8}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive8}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "09ee867262e7e6a5e89c8e705d943586b75f790070f527998e0bf83a38c95b7b",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf",
"similarity_id": "369c6be4d1c1c8b9029abbb49f2359ecc35f2f6e88010f835c1b8df39c479f64",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/negative.tf",
"similarity_id": "66b36a3a331b1b1cfea85d6a49b153ead150a9edf8953b149e185bf230d4d1ba",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{negative1}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf",
"similarity_id": "75e60bb9574ef6ffd13b5eac22690ce7ba9b0cbf089313475b222389b3ccb701",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/negative1.tf",
"similarity_id": "e7fcfb974dfdeca3762cf255c92bfe7f4216089777c75d4d6b303b72282f0abb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{a3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{a3}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{a3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive2.tf",
"similarity_id": "218c99b72697b5d8dc69c6307d7ab67eaf598f132e22e7ae8e7be97d64836f58",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{a2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{a2}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{a2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive1.tf",
"similarity_id": "14fb818504232a1707691f2ccf1cafecf6bf1cebaa3ba6bdd68323c0130dd368",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{example00}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{example00}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{example00}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/positive3.tf",
"similarity_id": "ba82a8835b3b1c6ad004f427b8aacc71734a973cfca0d88565cec63c07a45a45",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{postive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{postive3}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{postive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf",
"similarity_id": "5e3276a3079883cd1967ac89c3c3fabcf55cf944e266ad28221be632d235aa2b",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{public-bucket}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{public-bucket}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{public-bucket}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/negative.tf",
"similarity_id": "40882ba50ebe6cef99ee6c065d29d681dee772dc45d8ac93be459702a05d4eb5",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "68cef50e605408b2f4b5ac9bb96a66ffd1db36034b30474b0f3e150d9cd0cc6e",
"line": 83,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst12}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{inst12}}].tags is defined and not null",
"actual_value": "aws_instance[{{inst12}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive2.tf",
"similarity_id": "767cce0dd632a163730026194e22ac1640b7f94285a6e393dd4815d6c321af00",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf",
"similarity_id": "85160dc0f396d7491a76ab02c6bced4417775566c67433ec09193dede51b3822",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative2}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf",
"similarity_id": "2e3eeab7274491a175c816650f5252e268d39b2cd2ae04b8bc4e2933c5764ec7",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf",
"similarity_id": "32312921137a69ceb0994208f54402fd6b6ebdb7774e15c69bfe0720cb0ffd1f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive4}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf",
"similarity_id": "bb8ea811a4ab7206c36dbeb4b06203af39515761bdd977cf62a9c112d4a4ba37",
"line": 64,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{positive4}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_monitoring_disabled/test/positive2.tf",
"similarity_id": "9a9768e64ec9c88afee2f1ec2a9c8c180387d9ea9ae62a77fe334dfe93440e7e",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{monitoring_positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{monitoring_positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{monitoring_positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf",
"similarity_id": "1eefda542a82f205c5c82860f872d0546b31eea1839edec0ed8b56c8b3769c94",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is defined and not null",
"actual_value": "aws_vpc_endpoint[{{sqs-vpc-endpoint2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf",
"similarity_id": "0bbfc88181ca484edfd2fd2261fa85b4bb1993de0175f265013c85b09732cdad",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf",
"similarity_id": "073933d364e8ad6d7bacef5928a61cbe821b5fc435493f294ec3ac91456dbca2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/negative1.tf",
"similarity_id": "c89503ebe0fe9c3d97ba1f81eb8610cbc91eb22a66054e45f842780bfbd57cef",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_security_group_has_public_ip/test/positive.tf",
"similarity_id": "60b6c30bad6a7da721e12e6e14d84d17677d21f41106a15356129723e1643d42",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf",
"similarity_id": "288e1a9fdbac6555856810a39d0bf1fb46e546bfb848b4e4811feb5c38f97fd4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sagemaker_endpoint_configuration_encryption_disabled/test/positive.tf",
"similarity_id": "b77f53563a6a880962bfd89299dbc95349eac972f050899cb917e0951668f192",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_sagemaker_endpoint_configuration[{{positive}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has tags defined other than 'Name'",
"actual_value": "aws_sagemaker_endpoint_configuration[{{positive}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf",
"similarity_id": "941026080b380417420912d77b129f561181d9b2e3ee91d569e431cac0d67a66",
"line": 30,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf",
"similarity_id": "e47696e665355800fe8b40f351cd52389c910778a15cdcba3c473e090975fe49",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{q}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/negative1.tf",
"similarity_id": "484bd967d7f62f8d2066b302f7aab555b2cd361a9a518439ac4e2defff74641a",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf",
"similarity_id": "500b7547ffb7778f44855cb5cf190e7e38866113ed35943a4123b4da6c269a42",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf",
"similarity_id": "829e673f5c8332d89c31c1978e66b2d942636a906f1e5cac455803807577adcf",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{test_lambda2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{test_lambda2}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{test_lambda2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/positive.tf",
"similarity_id": "687905ea8280a48775153b37d3be9033740f7b3e3c5cc7152c56a6b05b33b40f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/negative.tf",
"similarity_id": "df97fdb5bc3354afea3801215dad5085d9eb4cb30814860d9a8e17dfd3516bf2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{test}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf",
"similarity_id": "64d5c93496ff0fc2b53d638f479cc0a6c7928e8d21afdeda76ad3e520e0b79ef",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null",
"actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/negative.tf",
"similarity_id": "b9940003156e61ad5af63d9f063bb4ebcba6b3d2db8ae8946a84b8cd1807f092",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_task_definition[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_task_definition[{{negative1}}].tags is defined and not null",
"actual_value": "aws_ecs_task_definition[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf",
"similarity_id": "0954f8c38e1399b5164268b9378ead9df9efb931a38966685b3ceb453ceb8cb0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "58006aa5953a62be80285d965954cc1ddc588d9db124fe35d0255929101dbab2",
"line": 61,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive5}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_service_without_running_tasks/test/negative.tf",
"similarity_id": "eb93bbb35d65945543c9ddf7517140502fa2273da99719e4e3c99e42deb9b7bd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_service[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null",
"actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/positive.tf",
"similarity_id": "1552e46b1c05e6c811a3b182b1e7e3c57940af23bd9e4aae7829c1b467ed5c70",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/positive1.tf",
"similarity_id": "eac23ef05dc1b31c79e841fd89771455c6e9ca54d78f76ad4e5cdf7701ca25b4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf",
"similarity_id": "76abc79cf8a5c8b582da62599653ceb331395c7c901a503698db1801ae4c3344",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive8}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive8}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive8}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf",
"similarity_id": "3b19eeb18c5870604f4a1c5877bed3d2875fa8d36c291da1edd6d66c3dffafef",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{foo}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/negative.tf",
"similarity_id": "e7d25e8eeb6d8ec494e7b4ac1c04c0f0669db04237eaefbd800eb957df74b539",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "6da67a3b662c358b5e57f30b725257ef9d3d4138c8bb2cb39bd90c67b7dba7d1",
"line": 61,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative5}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf",
"similarity_id": "24ff225d1c5b993e14cbb4596d8fd51f91d0b8f6032a9ce5be778cb884990ff6",
"line": 42,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{positive3}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_logs_disabled/test/positive1.tf",
"similarity_id": "426e3a813d3ffcd446db3239b2d3038a4f2c6f461d4bb26bddb8223da7b48b48",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/negative.tf",
"similarity_id": "df39e50db13cba60d95fe31f5eab483202659abd08461215f8c74bedbab1c13f",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{negative2}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf",
"similarity_id": "20b95cb272833a8a109c5bb61bb9615185b925cecea16b8af4088353029925be",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/automatic_minor_upgrades_disabled/test/negative1.tf",
"similarity_id": "2fe8152d51efcca906e01bfaae31e6ec135c595ed8e683a493d9c984b526bbc6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf",
"similarity_id": "2da471f3f0000cf5f7e0f835c30d186ccced1c2abc67f0172005011b911c202c",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{cloud_watch_logs_role}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{cloud_watch_logs_role}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/positive.tf",
"similarity_id": "794209cbf85465e34efcfbccca6713bd3186deb2e920ae6eb7978a7eb63e5e3b",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{foo3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{foo3}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{foo3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_insecure_protocols/test/negative.tf",
"similarity_id": "6beb1129fcf99437ee86c63bc30cc6e165bd4caa5519a5b84d2c3506591b4231",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_elb[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/negative1.tf",
"similarity_id": "1ffb0212fafe640ee6fe652f72ba6a0db50d92b743b6fc3a41db0bf907f1c218",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_athena_workgroup[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null",
"actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf",
"similarity_id": "024b277b161a021d1ab8f88a3a357598489e37b1a6f2d41310ee737894d0bd7d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kinesis_firehose_delivery_stream[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is defined and not null",
"actual_value": "aws_kinesis_firehose_delivery_stream[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/negative3.tf",
"similarity_id": "360b22fab444d5ce9f344a0c2307a7ee7b1e64e5eb98137fb12e661ea4037684",
"line": 35,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{negative3}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{negative3}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{negative3}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/certificate_has_expired/test/positive.tf",
"similarity_id": "dfb387d971fc64e3777466c11ecbd69f79ab5bfafd360e31184d35a99a13a823",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_domain_name[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_domain_name[{{example2}}].tags is defined and not null",
"actual_value": "aws_api_gateway_domain_name[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "0de03be8af24c0dcfede23eb7e42765a8063bc04acdfc29aadd8c2ea070fd0d1",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_dax_cluster[{{bar_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dax_cluster[{{bar_2}}].tags is defined and not null",
"actual_value": "aws_dax_cluster[{{bar_2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf",
"similarity_id": "f5aaad4dd6c2ca25d65175f8a3efc6b4ed225fdb1d8d507ad27c01b5ef2ae708",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_organizations_policy[{{all_features_allowed}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_organizations_policy[{{all_features_allowed}}].tags is defined and not null",
"actual_value": "aws_organizations_policy[{{all_features_allowed}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_domain_with_vulnerable_policy/test/positive.tf",
"similarity_id": "b1cac7f2deae0e332762d6bfa090ff8439dfb132113cd5ccb48e67eaa0674f2d",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{es-not-secure-policy}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{es-not-secure-policy}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf",
"similarity_id": "edaf2a8443111522214d44e2aab150717a989f64c0f3af02bd3e0b2d5d89c274",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{user}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{user}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{user}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf",
"similarity_id": "8da9369ce85355a8b706969db784e00e8518b6b0279c80e4dcfd5cf89a5abd97",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/negative.tf",
"similarity_id": "ff2e59a4f5847a96e125ccb9dd7e695cf0aa1ed9668e7922edf320efb9c18b53",
"line": 29,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{negative2}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf",
"similarity_id": "1d07c4736e5ffe5e83f6cc8c8d9b96b3cadf2b88524d6fcef720e6736b4f1ae0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf",
"similarity_id": "8b598fca21f90eab1c38ea28e78402bd29c1d77d60ce990152fb163fc5dfca5b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive7}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive7}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive7}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/negative.tf",
"similarity_id": "34b5b7eea0d1690bd684b0140bd95f02a6bed19b62d55d81c164724579734239",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_batch_job_definition[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_batch_job_definition[{{negative1}}].tags is defined and not null",
"actual_value": "aws_batch_job_definition[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive9.tf",
"similarity_id": "4ad915e306da616399af5c92a17a38d7ad7009704f672e619000aa24abb00cce",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive9}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive9}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive9}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf",
"similarity_id": "d961bd5b5e4844adf4488400a9dfa78200d42a324d5d415a30e3f6cacf696521",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf",
"similarity_id": "1c81e014d1dba3dbe8f95cc647a6abddd3205d7892fea3e05258283f2354ae57",
"line": 72,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{test_profile2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{test_profile2}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{test_profile2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_task_definition_with_plaintext_password/test/positive.tf",
"similarity_id": "0af559c0122892553f90855f00c2dc2669f195fd97f9b573f4f703f5afe65452",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_task_definition[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null",
"actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/mq_broker_is_publicly_accessible/test/negative.tf",
"similarity_id": "38e3965e93bc0ebb8ab6db47d0c59b857458c46eb00a8989411bdd95512ca7a8",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{negative1}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/negative.tf",
"similarity_id": "bc197c47743fa87497d3de82891388000a4fb5968946bd9f553aab9abcd4ddce",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{q}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{q}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{q}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf",
"similarity_id": "d497fe33ae44fb7021c9c883a0aaf0613e3411afa4fa3433e10a1ff2a4081147",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive6}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive6}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive6}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf",
"similarity_id": "8e7be03f53c62ffaae7813f12a0c06ccb29755838f44d36f8585269d40a6f369",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_rdp/test/negative2.tf",
"similarity_id": "f711138300784437dc5f7c823ceba28c141779c8c58fe3a201099e6b11b895ab",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{negative2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{negative2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{negative2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/negative.tf",
"similarity_id": "5167dc07bf8f7fb6e49408cc60a1b16119c4125be4afc310802e4dc72b635730",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/positive1.tf",
"similarity_id": "830435bb3a6cec187deb229545c04668edc00b7b52a4501d979bed68411f9fcb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_secretsmanager_secret[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null",
"actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive2.tf",
"similarity_id": "08ecd82604c837198214db3d23dd03776424433f730b26c8531abe08e083d36d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_server_certificate[{{test_cert2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_server_certificate[{{test_cert2}}].tags is defined and not null",
"actual_value": "aws_iam_server_certificate[{{test_cert2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "29a669983f734fac7e9fb8630bd673060936c2421a1925ba61d202c1848f762c",
"line": 76,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive6}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive6}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive6}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive1.tf",
"similarity_id": "d2e5c09aa3f99b431a4394cc403c12465d9d6a8f1e4a28a226977ed84a3b48f3",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf",
"similarity_id": "e9b3bb858a83b6d24edc03184e003f9e44d0890f86e14bbc2c80d11129382560",
"line": 69,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative2}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf",
"similarity_id": "e9ce565c69fbda08c58433b8f7c1e2f9b7aae9ade07bd0ab3df1caeb2ac2d590",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_too_many_access_keys/test/positive.tf",
"similarity_id": "5d44077d925c17af7698395a5cffd4beb5e710963ac785dba18f0c29eba1ed9b",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{lb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{lb}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{lb}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf",
"similarity_id": "65d0652aeba60add05c49c1836f10460412d48fb0fbbd8f48669015935dde10a",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{default}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{default}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{default}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive1.tf",
"similarity_id": "04312fe7b2d21d6262efea71e6fecf482e5e95d1af61f5adb6cb92e87bcfc48f",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf",
"similarity_id": "f54d8a536aa7ccf58605e825a61eb744b74e53b1fb90689570299f803a85b4e4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/viewer_protocol_policy_allows_http/test/negative.tf",
"similarity_id": "911d257c2a1854408c40ab0a879d522b5ba258faffe9a92caa95f5e02794b307",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive3.tf",
"similarity_id": "6f75dad11972a091197752a1614c603d3b9a25a0447ecafcf3ffe32e2ecc45d6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{positive3}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/negative.tf",
"similarity_id": "131afae0005f9daec5d98c96ab5b741ef6cad8da9fdc8ac80c6b46b07536b778",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_volume[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive2.tf",
"similarity_id": "efd58a6c5ba604f8a387bf22bb7efffc84ff34ef00393e62d8156048fdada7b6",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf",
"similarity_id": "badf30c5be23c8df8bb35d193a1b8ff8ededa67916b2f5ff808be09eae34a459",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{web2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{web2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "737bf3609d45ae5511492b7ce02f35b9036696032a452266d0f111967613ad95",
"line": 24,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/negative.tf",
"similarity_id": "c7978d6fedf8fa7d86f5162e4d2ea81b653fe62542b97ba75160afd5a1a4d49e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_organizations_policy[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_organizations_policy[{{negative1}}].tags is defined and not null",
"actual_value": "aws_organizations_policy[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf",
"similarity_id": "d311972bbcc9a536b29f16ef805c908cc3e391652f3ef1a68cde012db2e2475c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_cluster_with_backup_disabled/test/positive1.tf",
"similarity_id": "3eaec0622f056cce42179f558af3e321578d403acf3a413db1f8e7102daf412d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{postgresql}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{postgresql}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{postgresql}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/positive.tf",
"similarity_id": "e1d94934cc89878e082e1ecfecbbad0151f98890374adc2efba1ccdbc49ca4a6",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "4f591321f29717ab20238b97e1f78e4e469f9cd0eead4e86e0a75c61dacad232",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive1.tf",
"similarity_id": "fe0f89f652c7cbd6ddef463af3a44fa497771f7d997334eae281e0fffe5498d6",
"line": 38,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/positive.tf",
"similarity_id": "1dc960204a220423bb6e50a55d56d308c6ef87099f4742719851509ff87704c4",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf",
"similarity_id": "1f986e6289426c21229cef00384479093e6af8c3e70497f1692d6eed4d4cf9d3",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{user_one}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{user_one}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{user_one}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "938febd5c740791bec6131780a344b1963a0202f8896f43edf896cc6084892ee",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive4}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf",
"similarity_id": "da3ea37f2c4b6ad1490d9391fb9bb72660f55fc54fdd19ea994769f868fe6aad",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_policy[{{test_policy}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_policy[{{test_policy}}].tags is defined and not null",
"actual_value": "aws_iam_policy[{{test_policy}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "6b87bd5cc26e20ba7e65658041ab8520d47c6e28e7b027c9ac75831a252ca41d",
"line": 76,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive6}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive6}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive6}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "7cc7e5f4ee9f8797a0fa83c818a3bd9561b54ceaf9abba2aef810e21cdfae483",
"line": 56,
"issue_type": "MissingAttribute",
"search_key": "aws_lb_target_group[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb_target_group[{{test}}].tags is defined and not null",
"actual_value": "aws_lb_target_group[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "10b45e9e1c8e13ea719d055373f17142b5647e5dbc133a53f1d6342a4ee665e8",
"line": 30,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is defined and not null",
"actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "49e946826e6f62abd4671001251649aea7582e47fd5e8e89fea93b51f0214344",
"line": 34,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{subnet12}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{subnet12}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{subnet12}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive1.tf",
"similarity_id": "30ebc9cfe821c29299307b1681442b594380f300b92499b61d1efb5e7cc57c22",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_logging_disabled/test/negative1.tf",
"similarity_id": "55232098e347cf4d09ff1265ad24d2ec357926285bdf8108950604309233afcb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive1.tf",
"similarity_id": "37eda2d6d82cd29db279b251e529171cef14adfe8cfc0a157feb970983524a62",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf",
"similarity_id": "315a543709fcd468a6166d109fc8bde2aba48a1fa0624b7c69e3654bebe3c649",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/positive1.tf",
"similarity_id": "b73954a6100888886150b6cc3c2590d2f1f002528c6215212046131683bd4196",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_domain_name[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null",
"actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf",
"similarity_id": "946fea4bd27d1d8f3cc8bd68a34c71edbb9eb1525730e64c67bde19b9171ce53",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf",
"similarity_id": "7363b637ffd75998a8dcec86cbda05f30e0d78f9d19603c42d3de1d194249e36",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "d328425ea162f5ba17d8409d650a3e3f4e120963272b8f28af36b1b8d031b6b9",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/network_acl_with_unrestricted_access_to_ssh/test/positive3.tf",
"similarity_id": "f200d7876928cae8f5e4eab919d77a928cf3b076dd855ebdd59bc6d327927d98",
"line": 35,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{positive3}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{positive3}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{positive3}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "d30db3e7e5157e5e1ec674073be6de016b8cf56f835c471aa1b54692060f66d5",
"line": 107,
"issue_type": "MissingAttribute",
"search_key": "aws_internet_gateway[{{igw}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_internet_gateway[{{igw}}].tags is defined and not null",
"actual_value": "aws_internet_gateway[{{igw}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/positive1.tf",
"similarity_id": "af477de158b795b7f2fb383111d041022c195420495399385dd5232dcf838f1d",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{example_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table[{{example_2}}].tags is defined and not null",
"actual_value": "aws_dynamodb_table[{{example_2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/negative1.tf",
"similarity_id": "b42965f41e8276ea50c3f9e8cb3113ec705c0160cc9e611f5851df98806fddcb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "8514bc27efb710c8f777d267aeeac35a2b850b65dfd4f27fd54cc295dc547eac",
"line": 56,
"issue_type": "MissingAttribute",
"search_key": "aws_lb_target_group[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb_target_group[{{test2}}].tags is defined and not null",
"actual_value": "aws_lb_target_group[{{test2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/positive2.tf",
"similarity_id": "44cafc7a4ce5812940902c3bb801c30b4bfb86bb6c83648f8580e4ac1d5a9d06",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive4.tf",
"similarity_id": "861259c88ab87d1e97be8d6609e6de302001940618e4f2c266a939b648099141",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{positive4}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/instance_with_no_vpc/test/positive1.tf",
"similarity_id": "4c5f220b8db7539f7fca93f337eeb51b9b1b1f8157952bb5b130a87a6de1be42",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive3.tf",
"similarity_id": "fed199249c11dfa3c87814b8ea3731d122ca9a93eef49e8a3615f7d8f6c21303",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_globalaccelerator_accelerator[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is defined and not null",
"actual_value": "aws_globalaccelerator_accelerator[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf",
"similarity_id": "575a877c3c41a2b890775d30bc509c1d00278ab3509ba7b210ec5b0e77286cb7",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive3.tf",
"similarity_id": "7075baa6293ecaa00e4d8e9ee94c0120058c6fe8b83859929be25f8396634528",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive3}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf",
"similarity_id": "b01484f07af857ead34f6373d174104e0082153644164e858b2f58784af8a9b7",
"line": 24,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{positive3}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf",
"similarity_id": "d3805150a049b0d187cf192a75f80aa7b6a1ccb154c616194c9365a53bb52feb",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_kinesis_firehose_delivery_stream[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is defined and not null",
"actual_value": "aws_kinesis_firehose_delivery_stream[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf",
"similarity_id": "62ee282556d5792c87b241ded26ef2ce69f553bd45b9753464f33e46df623f5b",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{positive2}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/negative1.tf",
"similarity_id": "4949e7cfcad54198417fd3981a16044b7d399ed25884d49569ed9a1c4394cb29",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{web}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf",
"similarity_id": "23167c354cf704c54617b66a313bc67f36962177e03e24ac31fe7fd05482e071",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudformation_stack[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive6.tf",
"similarity_id": "e4e767b2000c6183ccb9a036048e783fd71f48ea094c18c5886808cbce865db4",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive6}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive6}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive6}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "b57e9977e1745174e6249dde1c5311f1adb4912a469ba63aa25828ea343cf74a",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf",
"similarity_id": "911aa7f5bcac0ed1c8c5e258939f04c784054cc5b0a70bb68494ce46dd794e43",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_route53_zone[{{log_group_mismatch}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_route53_zone[{{log_group_mismatch}}].tags is defined and not null",
"actual_value": "aws_route53_zone[{{log_group_mismatch}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/negative1.tf",
"similarity_id": "64f804060c4cddfcf454cb25522fd8fb7ac19723211ceea061711ae2df4f99a7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf",
"similarity_id": "c42891cee565577e3c5bb338c11d652914894a039b9b4f7308a2b159a3d1595b",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_policy[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_policy[{{negative2}}].tags is defined and not null",
"actual_value": "aws_iam_policy[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf",
"similarity_id": "f402c940fcb657fe183e95aff4936e6798329dfab1133fda5d3a36ec449dc32b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "d35f2ba315f1450faf1f860e38d516d87753f8e0b76e99562275ebe54a598cb1",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/negative.tf",
"similarity_id": "e8542ce93bd9d316e2f1f375d89b4b898c180a87abc2e61934a64271cccb51b9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/negative.tf",
"similarity_id": "c745a2628de1bd44e2d2d2fc5dc41369683b81c64dc172878cb421b63c14205f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/positive1.tf",
"similarity_id": "31d155f2c7aa1f689187f8440758f2bb216d72da71f70b923e790a14bc8dd5f6",
"line": 41,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{postive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elb[{{postive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_elb[{{postive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "a0b383612bdc292ed1d31680c997a3529f07a63adb4985178ddc02fe5a01e732",
"line": 76,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative6}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative6}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative6}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_not_encrypted/test/negative.tf",
"similarity_id": "d9df150b24779b16c197ce62e3007c939b807130482708c83dc6d2e49ded5db6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf",
"similarity_id": "f4beb44c2ac02e1800e292c8be6a03a42576cc66ac6085230afc63353ec5a1fa",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf",
"similarity_id": "9a29a7695a6996ae6869c34f556bce5896f74ef65d4471ba1c53471b8765786a",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secrets_manager_with_vulnerable_policy/test/positive.tf",
"similarity_id": "44f6bccaaea1d6642e9e34e7d2c599fbac824e768d6acfa1e3f9ce1f2e14ca13",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_secretsmanager_secret[{{not_secure_policy}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is defined and not null",
"actual_value": "aws_secretsmanager_secret[{{not_secure_policy}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "ef721ba48c4988277b4b6ed7d2fffb7b06ec5994f5722d027322611b9616774a",
"line": 91,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive7}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive7}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive7}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf",
"similarity_id": "aece977fc4e0c4f038b764fcab94b8dc5c16bca7e961062c2d33b64ea9ba1ca5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_logging_disabled/test/positive2.tf",
"similarity_id": "04cf4e8ce615ab352bb9ea9eeafca8eb1691184cb91fb2bf478f2a76e0379d38",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf",
"similarity_id": "12d8964e2f6c3e65150439272cacfebd9ff18f1181da7a52a1ac25a05aa33bbb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/negative1.tf",
"similarity_id": "355289dbb5db97f13bc02e2d4627c4eacbb66d53ba3d6c5cba8bbffdfcb194b0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_allows_all_actions/test/negative1.tf",
"similarity_id": "db3812848ec337cf9f78b3b60ead7016b2110cd982168b98a3ddec8faa14ea55",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "b0546040c33ab273676aacd6500cd5253a60495deaddf9aff15af3b3d6c56b10",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/positive.tf",
"similarity_id": "e9646fa15d593eed7a0d0a393b74ba6921c33ee1b7c86eef61b3912d15c1a53a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf",
"similarity_id": "27ca396eaeabee9269bdeb7e2c05b67c981457d615374899d56fe5ff6e23b61c",
"line": 51,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{test_role}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{test_role}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{test_role}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive2.tf",
"similarity_id": "54674de9e98cafbba34b292128a2d78f070c2d1e96e1ba945f16d3d441599732",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{example3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{example3}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{example3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf",
"similarity_id": "11e938d695ed577f9229ef5a765698fb14ec5b0d76584b31f9d0b6f51627d916",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf",
"similarity_id": "ee11fab17604538603125981a3fcd874e325047fd6f0f0b1fdb6353f6992efe5",
"line": 28,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{q_aws_array}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{q_aws_array}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{q_aws_array}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf",
"similarity_id": "68dd1ffa0d5c13b75e0a4a715b10c78e3c41bc5433d854bdcb88e93a94002425",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf",
"similarity_id": "f6a012672b69527fd3b269c7e06a32e5ca47655f9de04a4ab673ad51226769d5",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{lambda-role}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{lambda-role}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{lambda-role}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive4.tf",
"similarity_id": "bf54447c7468376cfa4514ac82e9d83285981508caa3efc07700c2d75ccfda7c",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "00b1abf495c2f3751082be775eb791baa7ca79eda7477f82fd829d10b106da9f",
"line": 106,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive8}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive8}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive8}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf",
"similarity_id": "de8063d843362cb4cb736ef0ea226e5ffc232369629c20127fa50dbe04e5e73e",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{negative2}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf",
"similarity_id": "49a6a35d70985a8fe28c25517a29523eb8142480dc9ee6fcd660f8f63bc71375",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{role}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{role}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{role}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/positive.tf",
"similarity_id": "87f7326890fef77ad4fc5dc79c0843de9dbc2866986c4c3ded61d7a8a6e98a97",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster_instance[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster_instance[{{example}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster_instance[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "a481971bf91659a20d2dc88a962b66e19c9588274096253db0bb9f61ada5d937",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/negative.tf",
"similarity_id": "362d22d6bcf8d2eda166d145891819ecd8226dd01aff79db2a95fb1ca7b62031",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive1.tf",
"similarity_id": "a72dbd082eb5ff41a6e267233afaabe531dc75157251c049919cb2fbdf8d0cf9",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive2.tf",
"similarity_id": "1a51b789e457a906da665bd95de7ac24e48da9dc440ee393e2431a5feb797dd3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_globalaccelerator_accelerator[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is defined and not null",
"actual_value": "aws_globalaccelerator_accelerator[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/open_access_to_resources_through_api/test/positive.tf",
"similarity_id": "f0c9a0ebd2a39e2db1eefa68ca65b2a147d95a29970e0df7c902fa4be2aeea22",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf",
"similarity_id": "60993c1b4eadb9f38ebcb44ae858212de2ed4141c972f5406dbc5319ae954941",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_lambda_via_api_gateway/test/negative.tf",
"similarity_id": "8436377b3c283b1ff432dd0c4b9304a040ffca7df54123d7eb7672cc3c69d563",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{example}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf",
"similarity_id": "9df8edee04574e02cad57184eca2bc66c168cee6c636db4af33607f406f297c2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_organizations_policy[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_organizations_policy[{{positive1}}].tags is defined and not null",
"actual_value": "aws_organizations_policy[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/negative.tf",
"similarity_id": "add4bcc38064f706367376cad320dcc1d2e045aac18b8cbbefa2217fe254e00a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf",
"similarity_id": "0ee636437b6c7a52bb125dc9a212535084efd14c21858d807a7b6bb552175b4b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/negative.tf",
"similarity_id": "1480987850b106de2e3229287bab921c86cc9807c7e4337d6b4095af70195edd",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{negative1}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "d842c78be33ffec57a9d1d44740c2213e27fa4ea1db4af9d93432d67884fc06b",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/negative1.tf",
"similarity_id": "c0954749a3431925300c4fb106d2529af49c9551e66aba172fd53c4027827b2c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main2}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive2.tf",
"similarity_id": "0d40f0a1db07d4055d196c96760cc845945c884404dd86172ac69398b3dccf46",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_cluster_container_insights_disabled/test/positive.tf",
"similarity_id": "058ee0fc9ebc6f3ca04f5b76328f4dca47a2cf69f74b08089b27623bb56e29eb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_cluster[{{foo}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_cluster[{{foo}}].tags is defined and not null",
"actual_value": "aws_ecs_cluster[{{foo}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/negative1.tf",
"similarity_id": "23e6292ef9b1a36f93e2098ca9914c07bb43a7f7abe913163a0e0d35e40e8efd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_task_definition[{{service}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null",
"actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf",
"similarity_id": "c5b0d4f93b74205883e45966ec9af2e820711ab2510ee5ff7d15a9d547262c5b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main2}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf",
"similarity_id": "bf6dd48cf6d1203cb7c72d21eccdc499882264dab222b8d73bf210f935f645e2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_acm_certificate[{{cert}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_acm_certificate[{{cert}}].tags is defined and not null",
"actual_value": "aws_acm_certificate[{{cert}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/negative1.tf",
"similarity_id": "38cb6982d7461cd71fafc837785e37cbbbaa74698a67bcfc28cb6a2729a809ca",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_flow_log[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_flow_log[{{example}}].tags is defined and not null",
"actual_value": "aws_flow_log[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "9d0414dcc59e22da3ead9aded256183b52397a20ac2ac572de66a334d3884940",
"line": 108,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{inst3}}].tags is defined and not null",
"actual_value": "aws_instance[{{inst3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/negative1.tf",
"similarity_id": "dd0bebc9a146da82a4bb62e589ad4c6c43dd3da8362a2456ddcde3867f928b91",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf",
"similarity_id": "2f82b0cd9f8770c98ce312929455de6f2265c3edf8c7674741f1794f13cfc68f",
"line": 71,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{test_profile5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{test_profile5}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{test_profile5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secure_ciphers_disabled/test/negative1.tf",
"similarity_id": "9de1651fa54629a08b3048245e5c99a2f01c87d15b203e09f28e61e60efcfcfd",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_using_weak_ciphers/test/positive.tf",
"similarity_id": "1d28706ea412ac062081e2eb4f9237e6febd748f8ac0a5305ca4bc23520ad075",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elb[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_elb[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive2.tf",
"similarity_id": "2d88d97c2ba586f2c7f9bac47cefbcc4eac8e7f8c861d5c2721c925ee4d73b3a",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_S3_Bucket_Policy_Change_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_database_auth_not_enabled/test/positive2.tf",
"similarity_id": "6a98d6eb981ad760fc362d285322b751d3795e56f3431d5bb7d07b88690ca782",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elb_access_logging_disabled/test/negative1.tf",
"similarity_id": "2f8f4e55043aeaf8060cde74f24b07e07ab27b147d56f943e87f228bfcf3f6a2",
"line": 40,
"issue_type": "MissingAttribute",
"search_key": "aws_elb[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elb[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_elb[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "f4ff64572cf8624c6a73e062d084aaf7063ff966a47acf2f2b6d04c70a879520",
"line": 90,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{basic-dynamodb-table}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is defined and not null",
"actual_value": "aws_dynamodb_table[{{basic-dynamodb-table}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive1.tf",
"similarity_id": "380f8a5a1bd203426cfd58e775b01fa99714e9641bb19406c683cd1f2651f499",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_secretsmanager_secret[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_secretsmanager_secret[{{test2}}].tags is defined and not null",
"actual_value": "aws_secretsmanager_secret[{{test2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "b61f222dd03a344da25ac882c4f8d6275425b042a0e8b25a4270c89b3c059291",
"line": 63,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{dsg}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{dsg}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{dsg}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_task_definition_network_mode_not_recommended/test/positive.tf",
"similarity_id": "6492e3bb40272db9ca02a049c91aa7c38784d0c9715890780d433eb4891ae742",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_task_definition[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_task_definition[{{positive1}}].tags is defined and not null",
"actual_value": "aws_ecs_task_definition[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive2.tf",
"similarity_id": "d194cf00dc68d1ad5b3ab4a338276adbff98456c011d8ec51e1b5c8818888994",
"line": 66,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{test_profile1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{test_profile1}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{test_profile1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/negative1.tf",
"similarity_id": "7a5d0d4a8aa566b266147380f833bb6538e6e758807642419c9fb0b588d0677e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dax_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "da98fa80bfdbbbd1439b4f1890d90eaa34f0b83426380542afa2450bea4d04be",
"line": 18,
"issue_type": "MissingAttribute",
"search_key": "aws_dax_cluster[{{bar_3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dax_cluster[{{bar_3}}].tags is defined and not null",
"actual_value": "aws_dax_cluster[{{bar_3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf",
"similarity_id": "59800085fef26e10d75221d6441c4b5dc695c15981aadc63a69c3bf558ec9764",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{iam_for_lambda2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{iam_for_lambda2}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{iam_for_lambda2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_functions_without_x-ray_tracing/test/positive.tf",
"similarity_id": "64f3ae5cb1ae3833c96ea65e885e8275d09759239b25929cef39e04851bb1e31",
"line": 45,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{test_lambda3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{test_lambda3}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{test_lambda3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/default_vpc_exists/test/negative1.tf",
"similarity_id": "77ddb67294ee6322fd636ef53f280e7b499721455a3376bd47ac7d337d03a1db",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_vpc[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/codebuild_project_encrypted_with_aws_managed_key/test/negative.tf",
"similarity_id": "3cc0b7ea613935c4f4d7bdc54430e220928a285a7e077282f73322135a710761",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{codebuild2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{codebuild2}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{codebuild2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive2.tf",
"similarity_id": "23f06ba7f2632a0e968726458bec36539432a3def4ad540f876613001d339117",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{positive3}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "67af587d429a510c8bbb24eea60c161a77fe115288afd2d57e759bf676736e68",
"line": 35,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is defined and not null",
"actual_value": "aws_vpc_endpoint[{{dynamodb-vpce-gw2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf",
"similarity_id": "42ecc118e2a125e40ff4e8e994daabaff1fba3d096dfb85dd1ad74fec3bfe567",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_flow_log[{{example1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_flow_log[{{example1}}].tags is defined and not null",
"actual_value": "aws_flow_log[{{example1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "e6cb93ea861b3f03f0ce6dcde8739a86a5174cebdc713e3b0a658b66bbad9a3a",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf",
"similarity_id": "7894314f1bb6c353c55e9df5b1a482fc4cd1d033a9b09227aff2f3536a08afab",
"line": 29,
"issue_type": "MissingAttribute",
"search_key": "aws_ami[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ami[{{positive3}}].tags is defined and not null",
"actual_value": "aws_ami[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/global_accelerator_flow_logs_disabled/test/positive1.tf",
"similarity_id": "33e2a1632801f87e790fdc9bfa89ccca2900eac657449781e906de237ab6f3b9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_globalaccelerator_accelerator[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is defined and not null",
"actual_value": "aws_globalaccelerator_accelerator[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_table_not_encrypted/test/negative1.tf",
"similarity_id": "c0f28dfdee8b6f17b11c0f1c23f56965ec53701851c9d9332dc6513d959826a9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_dynamodb_table[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_dynamodb_table[{{example}}].tags is defined and not null",
"actual_value": "aws_dynamodb_table[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf",
"similarity_id": "f658bc37686769dab71201ca47ae2e4e8ae221c6bcf7b9abfe5a6e0fb9b15dd5",
"line": 64,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{negative4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf",
"similarity_id": "5585cab123f52514fa535f5ff99a46b0dc91d09244ba0e4c18e00fbcb8e154af",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_without_slow_logs/test/negative1.tf",
"similarity_id": "fa9118747c5aad19e45ef1bd8a9304d6a27bf6657f6bf64a7fa9ef7068aec348",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{negative1}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf",
"similarity_id": "00f9de83cedf8974239af44f1cb7d314ac6fc2a828fb08766db0cd2f8868091a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{b}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ssm_session_transit_encryption_disabled/test/negative.tf",
"similarity_id": "ef59ce8cc6ee3d93e05acfef697f5e9b58bd268956fd9b896c18d9929219469a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ssm_document[{{negative}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ssm_document[{{negative}}].tags is defined and not null",
"actual_value": "aws_ssm_document[{{negative}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf",
"similarity_id": "ac4f9cbe5003cebb1c4d0f8dfc1ac309628bd3a4ae8ba3dd6df32aff24101e68",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_athena_workgroup[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_athena_workgroup[{{example}}].tags is defined and not null",
"actual_value": "aws_athena_workgroup[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/negative.tf",
"similarity_id": "9cbb69e3c91b531151b51aafa32f4e6d1a38281fd118942b15e5de232f8721b5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_config_config_rule[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_config_config_rule[{{negative1}}].tags is defined and not null",
"actual_value": "aws_config_config_rule[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf",
"similarity_id": "33e698690ec58b289134ba3553d2ac94fb844ee0b6afe9bf71432c7decdf8387",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_cluster_instance_is_publicly_accessible/test/negative.tf",
"similarity_id": "43d347b5382dcf0d85e858455aa63fe4424e7f4841836f902d4046c7cab98c26",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster_instance[{{negative}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster_instance[{{negative}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster_instance[{{negative}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "b67fa0956e0a1b91b3556b92447b6827b0416845ecbc0986dc4aa8db61a994f4",
"line": 31,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/negative.tf",
"similarity_id": "255e174a91bb6ca25dd86895b44ed007d99beb1dd54e6bc05ba27a551d79c518",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{test_lambda}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{test_lambda}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{test_lambda}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf",
"similarity_id": "691377719393a88c71a5b95170e86d3506e97e1c55df278b27ec7c86009a970d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative1.tf",
"similarity_id": "17d4cd0e8489ef9b016415046fb0ec40cfc95bf0475ad8f375471d708876eb26",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/ami_not_encrypted/test/positive.tf",
"similarity_id": "3c3ad490b88fae3262e297e43719cbd06120af70d8f10b9cee814460ad19ca31",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_ami[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ami[{{positive2}}].tags is defined and not null",
"actual_value": "aws_ami[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_policy_with_public_access/test/positive.tf",
"similarity_id": "371b69531b7eb0c269275c8e8b3d328819f4b29c500218b5e364c5d666a371f7",
"line": 32,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{q_aws}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{q_aws}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{q_aws}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf",
"similarity_id": "4d38df0194d335ff891c61f9d82c4f162bc3d082b4a6fd8d186dced344319d3a",
"line": 4,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/positive1.tf",
"similarity_id": "4ba7fe12c1407e79b10aa5914db2179c929a550ad20a53318619087248f65b0d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_cluster_with_iam_database_authentication_disabled/test/positive.tf",
"similarity_id": "cad43037f560ca1924a9c90fa5d19f096c7b2240f384f2f300c1e331bea48856",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf",
"similarity_id": "4fe751a15cd90a307f4f6b54c54356c079c470ef834d00624aa785c077e10207",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket_object[{{examplebucket_object}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is defined and not null",
"actual_value": "aws_s3_bucket_object[{{examplebucket_object}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/negative1.tf",
"similarity_id": "1460d114b75bd15da8a53d2d505b3f03457384f0e9c708e245cfd901b6c924fc",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/positive1.tf",
"similarity_id": "369d9fcf12363afcc763cb869aef150ea81305afacba1bf0d57ebe6d579266d0",
"line": 72,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{test_profile}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{test_profile}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{test_profile}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "762152dbf211afdd3def573e8bba9100d4e3fc85da1c215b4d82b3b5d1c52da7",
"line": 47,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf",
"similarity_id": "1694af784b2890619c1a2eba5372620db623c4cbe48009e387a2213ac917b079",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{positive1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf",
"similarity_id": "03df93e9bf127e7171c34ea92c3c888b9d94556338dacda1c70d7f972c3119e0",
"line": 23,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf",
"similarity_id": "1ee0cd3359c1b7fa224c745b9b5c1b6d8fd25d59063856454507d1811e5e8c3c",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive2.tf",
"similarity_id": "6062554f7080cbfcb7e82cef9c8642ef5104d47741b4408fb95e956b8eacd469",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/default_security_groups_with_unrestricted_traffic/test/positive.tf",
"similarity_id": "38b0b47595475cf25ca2db234daad913a20519ca1c635b0f745ab2fa5fd40aec",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "499e429ee05b925d74808ddd398ca9bc7e6a06c24a5a90647d070109b6a5afd4",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/positive.tf",
"similarity_id": "075d2bb6cc4d08eef2a2f4b7097ff4a10cafd07668d7f13148db28d5091e9ae4",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "163971bbbf493fb1a8331582d92b6ff7df7ca1ca5327beadca306896f13456c5",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_sign_in_without_mfa_alarm_missing/test/positive1.tf",
"similarity_id": "717cf4963f674d5c5918c44a95ef3c795185fdb51be4b3451896771466139b7d",
"line": 38,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "99b8718f26ec19b0ce1fc68ffd16ce990012a310d605be88c8c1051955c44b99",
"line": 53,
"issue_type": "MissingAttribute",
"search_key": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_network_acl[{{allow-public-outbound-nacl2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/positive1.tf",
"similarity_id": "08bd08456d7924d025233ee6186fb710c1b76e7388a50cfe956c6e3bca439209",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{example}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf",
"similarity_id": "2ededcdd11b3dd8ec11aebdc31663326426fc56c18c38553f05501bb17ad3b06",
"line": 19,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{foo}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{foo}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{foo}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/positive.tf",
"similarity_id": "dc709bf7a1d3eedc7802ff6b49d5b31f4848bbd9f2ed58dd35a9754558d39d0b",
"line": 67,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{positive2}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/auto_scaling_group_with_no_associated_elb/test/positive2.tf",
"similarity_id": "186ddbbfae216891ef19ec19b9ecefc39476131d70773ed307d2bae0d0b2d24e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_autoscaling_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_autoscaling_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf",
"similarity_id": "3ab2487e28261dab79c7df0c5c958fda5a5ee28b2c2b3b14a5689b84aa3fec0b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudformation_stack[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "e8ec4e91b1a690bb82c7954c5db336f9ca782d5975333aef74aa1aea32ad01e1",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "df7be6940efbd99be9e931c7e6f362224ad4224e7b92a2f30fbc02fbfb1f96e3",
"line": 80,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive4}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive2.tf",
"similarity_id": "a10c0c7ad96cbff1a8bee0d121de0f3f1af4652fc4a89713bd25e43809c22e1e",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_volume[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive3.tf",
"similarity_id": "1dee35cdb166279d17470fe403e40b307d91b327bbab9115310519e2ccdd70d4",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{disabled_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null",
"actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_security_group_with_public_scope/test/positive.tf",
"similarity_id": "9c41bc969168420830ea834f42edd8fb090cdb6051a1a5422afdaa6b1d8ad31b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive2.tf",
"similarity_id": "ddc6e3c020474937782826aa002f6abb1c6c9a66d53f2da52984fe7de23e7fff",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive1.tf",
"similarity_id": "7bfe3fdde1154909c1f033c9fddbfb9c9d0a05c757bd4cd96e71d2597427a3cf",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{positive3}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/negative.tf",
"similarity_id": "f9acbe3d5ff37a69e3591d00b1b982e0bad2d0de4879b5446b9c814f45056c9d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf",
"similarity_id": "eb7a8280f79beefa08c97eb27424284ab2f0c061fcdd80c0aaa46f043b767afa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_user_with_access_to_console/test/negative1.tf",
"similarity_id": "18f5fc4617f9f02db4aafc68209bcc43ca273c2bfc420c06390d2466da153a93",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{example}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf",
"similarity_id": "c5796037a6c6dd9ec62bcdd14fba70fc86d894e93e629744946ec98670b794fc",
"line": 51,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{test_role2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{test_role2}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{test_role2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_publicity_has_allow_and_not_action_simultaneously/test/positive1.tf",
"similarity_id": "b76bb63d0fe87769f0f5760dbc963d9973c0eff03cb994d0bac2a1c85acf24cd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{positive1}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_logging_disabled/test/positive.tf",
"similarity_id": "d861b8319f64b5b27a0b5ef8e6b6425fb817e2fa24de1966a9b6e98d84fbb346",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/positive1.tf",
"similarity_id": "4d4f54f186e3f133bbfc776833587aa21ad50621e7eae5c21306706590f42c7f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "702f509ae841055208e001af8fa7ca8b3016725173987c0a0d9ef07d1967f655",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_has_public_ip/test/positive1.tf",
"similarity_id": "a244d588c8457e9d17aff7ab0881e78cd7e7ee24b86303fefc3b275289c7ca73",
"line": 31,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web3}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{web3}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{web3}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key/test/positive2.tf",
"similarity_id": "5039c269aed724abfad32d1c29291cfef836fcd835dca2a8f2f21253d428d26d",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf",
"similarity_id": "0f320bbb08a464ad3bb201576c6ab8fe0ab7515b5538f0365d3d47d19b4a4f5a",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_flow_log[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_flow_log[{{example}}].tags is defined and not null",
"actual_value": "aws_flow_log[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/negative.tf",
"similarity_id": "53ba19713edd180b6038950f1ff1fc1afbaab73ea4189808d3d9ae3388fad567",
"line": 4,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policies_attached_to_user/test/positive3.tf",
"similarity_id": "f049e2f4b1410080c08b7fdd77e814e5032943642bfaa92e8d9293126a3dd0a6",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_policy[{{policy}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null",
"actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/negative.tf",
"similarity_id": "4e5f465f56142a344ce9f324875fc4684f341c8f90ff397b5ecedf5a4c8a8d22",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_kinesis_firehose_delivery_stream[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is defined and not null",
"actual_value": "aws_kinesis_firehose_delivery_stream[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/negative.tf",
"similarity_id": "d85c3901d6445c824c3205812d9e0b4ce0285ee1055db4434284d399fc1521a5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/negative.tf",
"similarity_id": "fbec022839c6cac31f117cceb5a9883392700eaa7c34d6c9899534dee636e5b6",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "e5d0ff714dc834507f94824c26905ee1102f6d95c36d0970ecba2b12552a1619",
"line": 52,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive3}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf",
"similarity_id": "2fe5ca60f925f1faa050b6a00f1e4ab559ece56062407fb40789cd0c6bf6f14b",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/negative2.tf",
"similarity_id": "4efefabf083ba0758f994f07e6c0c6e2d03c049a9f9a811123260110236cf0ca",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{negative2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{negative2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{negative2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/negative.tf",
"similarity_id": "acf8cb689ff30f9cb83a11625b86ebf6c3cc257db0561240c03607c1ba695af9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{mainvpc2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{mainvpc2}}].tags is defined and not null",
"actual_value": "aws_vpc[{{mainvpc2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/positive.tf",
"similarity_id": "e2d8037886c3bdf488e71230a00947af99426033c301655a49e5cd1e82b2682c",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_efs_file_system[{{not_secure}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_efs_file_system[{{not_secure}}].tags has tags defined other than 'Name'",
"actual_value": "aws_efs_file_system[{{not_secure}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudfront_without_minimum_protocol_tls_1.2/test/positive.tf",
"similarity_id": "0e1caf5ee91f0953bd914f1e3b0cf3a467c663135c80cdcbf83213f12cd61a29",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "92035e70ffe2241953d3e583cc1aee9d83c867f810614838cd3b96f6f81f8f32",
"line": 63,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{dsg2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{dsg2}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{dsg2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_endpoint_config_is_not_private/test/negative.tf",
"similarity_id": "24bb2934969beeb06f1b9bf414e98f9559e37d338267ed4dc409cc62756c3ff5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{negative1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf",
"similarity_id": "9e06c6e1603dd8174b1244ffe631c81c2a6c0615b012755155b90da9be3d0cde",
"line": 4,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{negative1}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf",
"similarity_id": "1a38a4f86212d5c9cff8034f5cac14b43dedcc8e75cb3de8ed1501548d8490bc",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_default_security_group[{{default3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_default_security_group[{{default3}}].tags is defined and not null",
"actual_value": "aws_default_security_group[{{default3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive1.tf",
"similarity_id": "ae01458619d3cb08379e2a0f5c2a124ee3a1b661b6cf51b45d3aed0182a2c74c",
"line": 87,
"issue_type": "MissingAttribute",
"search_key": "aws_eip[{{nat}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eip[{{nat}}].tags is defined and not null",
"actual_value": "aws_eip[{{nat}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_image_tag_not_immutable/test/negative.tf",
"similarity_id": "fb60c9676378238bf5f34f5aa7f841dd619dc872a212cf9d3f4c2a21eef4e4ab",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{foo}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cmk_rotation_disabled/test/positive1.tf",
"similarity_id": "9ff674fd4c1d89108215f2de81501dde202d0bbd812b61ca2d3f6c249a308171",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{a}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{a}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{a}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive3.tf",
"similarity_id": "a2c0962dfe1ddb30bc455409d74cdec0bb5f6270dc34db13e1c35eef91ae90a0",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_Security_Group_Changes_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf",
"similarity_id": "aa45110b8bbecfe4f26b3922eef575cf7b6cbe6cab7af1384c21615be13e1333",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "b5d8b948ae86e6c19f4d2cf517109c7544309b145da1060bea87ab910c8ac59e",
"line": 76,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative6}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative6}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative6}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "b9fcf85b215a6791f0022f2556eb62519ce78880e64f65531fed2c0b328617cd",
"line": 82,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{inst1}}].tags is defined and not null",
"actual_value": "aws_instance[{{inst1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "e55687ee31d44735838f27f843bf4fd3227a35648000cb4bfef50155133a56db",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{vpc1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{vpc1}}].tags is defined and not null",
"actual_value": "aws_vpc[{{vpc1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive4.tf",
"similarity_id": "2cf8aaadc1efca770f97b345001c6f0190fa95e7ce02cc1588a2106866c5d18e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf",
"similarity_id": "b7b19e20c75b99ab49ba05a22f01bf622c53d8e34d9ea9d6994f8bb470d6cb63",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive4.tf",
"similarity_id": "c9fd34d9d27088cbbb41db3200be1cde9add3b06fcfb2a9a3fe3ffbcac9bb3cd",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive4}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive4}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive4}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_not_encrypted/test/positive.tf",
"similarity_id": "984377e8134080395f285efdba53d519e77ff043282a27d57bf82b4acc881425",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_sns_topic_name_undefined/test/positive.tf",
"similarity_id": "982e1352848af2d100c1cf88786ce9227a40224239fb39791db67a6402cc4291",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf",
"similarity_id": "b44214e547049ef913befd33828546a087f82e1da2f82d404e27a6ee486868cb",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cognito_user_pool[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cognito_user_pool[{{negative2}}].tags is defined and not null",
"actual_value": "aws_cognito_user_pool[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive4.tf",
"similarity_id": "afa43d50a177f29a4a706003eca3c7aab0d1f20685f5ba6e899343e73396fe50",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative3.tf",
"similarity_id": "4a537f92c39af2b24f69c5d2d2c49ddd7f11d372bf0e254953a3b5ba4919cb34",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{enabled}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{enabled}}].tags is defined and not null",
"actual_value": "aws_lb[{{enabled}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "75f9777570c99ab5547d4497da40f432fafb4bd0c0da16ae3c970cd905682369",
"line": 61,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive5}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "7c6dda3a73888b08142eece5daef8aed2e391630964731f9ede3c7432a41884e",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{private-subnet}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{private-subnet}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{private-subnet}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf",
"similarity_id": "9dcb841c390a8929c7cb81d0032414355ff366409eb63d444493b2974a3c5d37",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_config_configuration_aggregator[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_config_configuration_aggregator[{{positive1}}].tags is defined and not null",
"actual_value": "aws_config_configuration_aggregator[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative2.tf",
"similarity_id": "234f8e60da0d499c4c98e4362d24170bea533db1983a7f655643d14ec800bc98",
"line": 29,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_policy[{{policy}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_policy[{{policy}}].tags is defined and not null",
"actual_value": "aws_iam_policy[{{policy}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_snapshot_not_encrypted/test/positive1.tf",
"similarity_id": "30941eb9e12e564ea70620a40fc2fffdfdbf412c2b1f67cbc12205a472650840",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_snapshot[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_snapshot[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_snapshot[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/aws_passord_policy_with_unchangeable_passwords/test/positive.tf",
"similarity_id": "6da9cf1307246f14181930af7528366c659d7045350cc83a5bd5f65fc9726f10",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative2.tf",
"similarity_id": "1f8423f3889aad9b2069339841db249da47be9cb7de5f39e048a28becd8cf9b7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_server_certificate[{{test_cert22}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_server_certificate[{{test_cert22}}].tags is defined and not null",
"actual_value": "aws_iam_server_certificate[{{test_cert22}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf",
"similarity_id": "aae8be024ae2dc00ffeac6cb9018f52f300eb454c897055b7cf7f732fa2c01e5",
"line": 32,
"issue_type": "MissingAttribute",
"search_key": "aws_cognito_user_pool[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cognito_user_pool[{{positive3}}].tags is defined and not null",
"actual_value": "aws_cognito_user_pool[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf",
"similarity_id": "20c8f6c27ec76ef7aba62b59bfb7478e00320f3687506b8b1b9c2960b2aee752",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_flow_log[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_flow_log[{{example2}}].tags is defined and not null",
"actual_value": "aws_flow_log[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive1.tf",
"similarity_id": "bae526766626119cb4241a4ab7dafcd9ea56d606c8a0077a8a4be8190f1ff7bf",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_replication_group[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null",
"actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kms_key_with_vulnerable_policy/test/positive2.tf",
"similarity_id": "018c21605d11540dd3a13a83992d6301d871c23f33dc9afbc8f697730c7dade3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_publicly_accessible/test/positive.tf",
"similarity_id": "0016630a8c34f4eff3a0aaca9e7749a87395959b46f803c0feebcc13093edb6e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_s3_policy_change_alarm_missing/test/positive1.tf",
"similarity_id": "06dafba0889f7a0dfbe15d7eeaa7b8399136eafd147c9dac89065126211ea45b",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_s3_bucket_policy_change_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "513e22c2f03628d40876f6fe55a78e2d6076e249adf1364ef3434ea1a22aee52",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_not_ebs_optimized/test/positive2.tf",
"similarity_id": "1b3654352954d3259c45f249b3a6a32751caa5850cf4cbffb6cfc59d9ff0afb1",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{web}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{web}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{web}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/negative.tf",
"similarity_id": "488b6284ac054f8288f53f91a33b5b9b66d46152a341cb85c6d946cb28f27a29",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cognito_user_pool[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cognito_user_pool[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cognito_user_pool[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/negative.tf",
"similarity_id": "7fa574ff6e00a8c3e7b9d1d8fe7fb6405cb5994dcaf4c2d7fcc7efcf9afdf0bb",
"line": 21,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{negative2}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf",
"similarity_id": "1ae11b5c34bc8dfb1b6d7d138c7277a4324168128e335b627272496bdcf725aa",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/autoscaling_groups_supply_tags/test/negative2.tf",
"similarity_id": "b8729e07b6b29248dde8401df8f2da902196ecba2e6b26ceab0471ff4fb5aefb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_autoscaling_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_autoscaling_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_autoscaling_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/negative.tf",
"similarity_id": "48e394d2b464d1f2da97d1361bdeeb22bc1c5ef4ce4e429a8e490374c90da544",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticsearch_encryption_with_kms_is_disabled/test/positive.tf",
"similarity_id": "cf87a7640cd0e4bff87abe256c4a4238fe3c366ad643537058794d29a3938248",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticsearch_domain[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticsearch_domain[{{positive1}}].tags is defined and not null",
"actual_value": "aws_elasticsearch_domain[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf",
"similarity_id": "a5b97d1e1c1f33de962232b376287796fd3d5e0bbbce702e8aeac1a39f1e80cb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{disabled_1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{disabled_1}}].tags is defined and not null",
"actual_value": "aws_lb[{{disabled_1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf",
"similarity_id": "9be721d034a88551b79b7a398d01c81f3306365b98f2ff1ff5c4d9fd48098df5",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative_rdp_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative_rdp_2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative_rdp_2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf",
"similarity_id": "7fff89cfcd942ab435923c62da6cefde6ddd4fdaa81d1780e299cfd1a20646f5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{b2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/negative1.tf",
"similarity_id": "72ec12b487c7e9d3dd1e68580dfc5c974a98665278f3b1164880ccf14f86c421",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_security_group_changes_alarm_missing/test/positive2.tf",
"similarity_id": "e6dd823caf7a585dd7b65f62855a57a20ff57c92aa0beb81a8bd8c648b47404e",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "281d707fc8f4759d51c817fc8ab0a0be8ff772c3ec5839abc94a063a5097d074",
"line": 31,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "5ae8b018575d04dd20b6e8e9440e73da7cc148ff384e5eac3e9e8498e7827d55",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{public-subnet}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{public-subnet}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{public-subnet}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/positive.tf",
"similarity_id": "a0eee800f0535ef372677f08318e4864315e62f73d1436dbdcecf33d73c441e7",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_config_configuration_aggregator[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_config_configuration_aggregator[{{positive2}}].tags is defined and not null",
"actual_value": "aws_config_configuration_aggregator[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/stack_without_template/test/negative.tf",
"similarity_id": "833afd15f489ca94f8359c3ab68974879c9f6432206fa58e45403f38bf62cdb6",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudformation_stack[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null",
"actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf",
"similarity_id": "384563f2000b97b49c76c0b744d6f87657c29650bc3aaacd7d698613b494940a",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_management_console_auth_failed_alarm_missing/test/positive3.tf",
"similarity_id": "3c7f7e1bcd73f128dd48e5b415f62bd2ffc62aa6a173d36305e31ef0659a1ad3",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_console_authn_failure_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf",
"similarity_id": "8df4ab9d742dfbd7d76985f1cbc05ff9304bd86987d259c892761b433889c44e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{hoge}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/neptune_database_cluster_encryption_disabled/test/negative.tf",
"similarity_id": "22c49b122aef8aa6218731b03f2fd0d2c6bf84e0cf5b7404d13b3b97b1c2c935",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_neptune_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_neptune_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_neptune_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/root_account_has_active_access_keys/test/positive2.tf",
"similarity_id": "a367c223bed4b262eb59cca637b5ac9ea9efa3179ff7aaaca4aef6889d717bf2",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{lb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{lb}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{lb}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/positive.tf",
"similarity_id": "2ee4037e0bfaaebca4de967bd0036ae1e23a1f4bf0fa8c1d70447102045ade7e",
"line": 31,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{positive4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{positive4}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{positive4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf",
"similarity_id": "59fb9a79d5902a0a2f72436900db7bdd09cdb7b9d3631fcc7a1fccd62d7c1ae5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf",
"similarity_id": "3834c9adf8937618934f261798ed8c0fc29537a0d215d89901e8e677d46d17ce",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/guardduty_detector_disabled/test/negative.tf",
"similarity_id": "0cf1391ca55a0848e6dcd111bf16c344c999b5c98f1b27866b6206d67bd5756b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_guardduty_detector[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_guardduty_detector[{{negative1}}].tags is defined and not null",
"actual_value": "aws_guardduty_detector[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_with_backup_disabled/test/positive1.tf",
"similarity_id": "833c6c3f7c9ed303a2e1612a4e6e7cc9ed2f10abeddf41b6b10c2ef375645f88",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_security_policy/test/positive1.tf",
"similarity_id": "30572ab291cdf06c53feef4a67c31936710a3d67070170d90e109ea362a34204",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_domain_name[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null",
"actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/positive2.tf",
"similarity_id": "2dd4f8f95eca6d6c33c448f433f98deeebf493bbb936113e3e3f35cf51d0498a",
"line": 86,
"issue_type": "MissingAttribute",
"search_key": "aws_eip[{{nat}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eip[{{nat}}].tags is defined and not null",
"actual_value": "aws_eip[{{nat}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "3b52be7ccd4384373ae53b5a5c8ec90d022e3dea5d32aa74da9fda48131d0d84",
"line": 96,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst22}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{inst22}}].tags is defined and not null",
"actual_value": "aws_instance[{{inst22}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf",
"similarity_id": "c114ffd1fe9e71076ebb5603a4029e258720b56be6654d604182b38455ec95aa",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf",
"similarity_id": "f8c357fd2709f9cac5ce2242168c25cda405d166748fdd439ff2874beebaf447",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/positive.tf",
"similarity_id": "693c6b1b83cb84dcfc101c911b27826411c5715bf85cbc09ce92708485b839cb",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_content_encoding/test/positive.tf",
"similarity_id": "1eef4bcea4ae9f3a6acb090ab4a90f351e0e6ad94369b99eadf218205f82b508",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{positive1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "cda229e77ffdbcbed15a49f4a9f3658b751bae35e0c6922c00a12679fc7ee9c4",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative4}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/authentication_without_mfa/test/positive1.tf",
"similarity_id": "6affd9e757245633559f25f56d3fc5bdc492c91380dd1face201c5fd701a2f11",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{positive1}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_publicly_accessible/test/negative1.tf",
"similarity_id": "13c886cd1452109a92b483cbb46860b8f77d2240f01348a8fdd10291b93b2af3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{negative1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive2.tf",
"similarity_id": "3d08ddfd925693ab1c9c32485d35808588ac6d9abc1ea02ccdd49bac13fe10ab",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_task_definition[{{service_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_task_definition[{{service_2}}].tags is defined and not null",
"actual_value": "aws_ecs_task_definition[{{service_2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_group_without_users/test/negative.tf",
"similarity_id": "fcd4fa42ff7d45e41e3f1b91adc6626b4eacc885aade0306a59e86c19834a7ca",
"line": 20,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_user[{{user_two}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_user[{{user_two}}].tags is defined and not null",
"actual_value": "aws_iam_user[{{user_two}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf",
"similarity_id": "f22789d04b8b1403818e4a411620937640f2b021874e9a62798db357ba773dd6",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{public-bucket2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{public-bucket2}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{public-bucket2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "4332ace44f5e064a340c8373ae6d0243898f1e4770e5f060a6d4de9c9ebff5b4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf",
"similarity_id": "14927b7e021766d6a67464303fee04e8ab8360e7114086f20899791b2da23c32",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf",
"similarity_id": "a7d173569d7a016917bd5939a7bf51fef6a84ae3c328f47dfcbd38fb5d8e0fc1",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_policy_grants_assumerole_permission_across_all_services/test/negative.tf",
"similarity_id": "a6f97695d5a67f026b54b6737b70b7f02010bbd87714c915119fa0fa44aae6de",
"line": 61,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{negative4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{negative4}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{negative4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_storage_not_encrypted/test/positive1.tf",
"similarity_id": "9f1e1a96a296750c993eb4423f1963e5ba213e06d7f8a30adf9a8af7809773b5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf",
"similarity_id": "ce2fc142c4e77729ebfeeea61696cba28fd40b476415f9dbd02e9686ae8d71da",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_subnet_assigns_public_ip/test/positive1.tf",
"similarity_id": "4f44335b78daf819489d6f3631705ee15f67ae857c23ef9e59643fd4bfb16977",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_subnet[{{positive}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_subnet[{{positive}}].tags has tags defined other than 'Name'",
"actual_value": "aws_subnet[{{positive}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf",
"similarity_id": "d804240d04d6e1dc57142654b2d1e8345d1d9addf7be6d8d47fba607c0d20879",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive1.tf",
"similarity_id": "7b30d19f6b76b71271db841a6c68752d006de9f41d3800af8bc570a7cbd38039",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_encrypted_with_aws_managed_key/test/positive.tf",
"similarity_id": "c662a1c3aff2e5d8a1a08ecf9c8ed67f9f62b0455136fdd9846ea635d653f11d",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{test2}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{test2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf",
"similarity_id": "587d003f018d259d59ec27cb0871858678c6118fcf41b4b36e6dcfd1aae1f40f",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_task_definition_volume_not_encrypted/test/positive1.tf",
"similarity_id": "d7b8a6817257fe11d9e53c30fdbeca3deea30081a7e5d8006fe1b6a257244c7d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_task_definition[{{service}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_task_definition[{{service}}].tags is defined and not null",
"actual_value": "aws_ecs_task_definition[{{service}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive2.tf",
"similarity_id": "cc04f65894ecccf45706ad5f1bca8f368a9b7c97c13299574cc96166565e5d32",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_unauthorized_api_calls_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf",
"similarity_id": "d97372acc69a3fc7cb235309877d6da7eaec1b19d082109142aa662089cca0ca",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_usage_plan[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is defined and not null",
"actual_value": "aws_api_gateway_usage_plan[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/athena_workgroup_not_encrypted/test/positive1.tf",
"similarity_id": "b5053dcb7b2ad6839a5b2f498153f3ab11a56394110970dcf6b3fed99100cc46",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_athena_workgroup[{{example_3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_athena_workgroup[{{example_3}}].tags is defined and not null",
"actual_value": "aws_athena_workgroup[{{example_3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf",
"similarity_id": "b07f5d0e0400b24fd67fd6b7f400b254ffc99cb9cb52cb16ff7d0b70a979a1a4",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "bec8b88dcdd7274c0913ae55ffbb97e39181735b7beb02cede22aac4a6afe55b",
"line": 50,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{public-internet-sg}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{public-internet-sg}}].tags is defined and not null",
"actual_value": "aws_security_group[{{public-internet-sg}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_stage_without_api_gateway_usage_plan_associated/test/negative.tf",
"similarity_id": "88d3c42ad9afaf18587c30b64e87e361b6e663520c45d5dc53f6e31d0196aa44",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf",
"similarity_id": "e4570226e23eff95f0e8092718eff2b6b165ccb72af1615709e124d653ee273b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/negative1.tf",
"similarity_id": "1ba0e13f7133e120992d54567c8a436cf1c709b653a3c8a04a2c34b03f52704d",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_apigatewayv2_stage[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_apigatewayv2_stage[{{negative2}}].tags is defined and not null",
"actual_value": "aws_apigatewayv2_stage[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf",
"similarity_id": "54431b4ba109f780027bb657a4b01e3bf5fac5618443d38e7f226c1e9549955c",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{foobar}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "79edd38fe37cad070083c72c6c661c1bf760dcdae8c41cedc880daa41a7a1abd",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudfront_distribution[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudfront_distribution[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cloudfront_distribution[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "620489c70fa3399b9a537d08cfa8225cfb43d3aaa5629d47b3bf29088c98e56c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/negative.tf",
"similarity_id": "80ee37016638db5b66f2bbd4535df12b9fb7b014bba793b2407c86a45d16497e",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_cluster_logging_disabled/test/positive.tf",
"similarity_id": "2664f51812f69054da3e0d27289877929dce48dc24ebc3ff1facbac211825607",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "601f093f973a6a58c312a2ca5d41f76b6fcb08f132d9a1de86abb7625e5c03a8",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative1.tf",
"similarity_id": "6e69cf0147859cdf85c98abe63c36358c5dd505b88b657041bf6495aab32a05f",
"line": 107,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{priv_ins2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{priv_ins2}}].tags is defined and not null",
"actual_value": "aws_instance[{{priv_ins2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "c5876b169aed55a45a3d6baaa838ae7089f6e3b7732ade59f743367130d863ef",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/certificate_rsa_key_bytes_lower_than_256/test/negative1.tf",
"similarity_id": "de004ddfe8d1692f19f09107d29c4dbdbccb706646afec6a76f16698e59b1ebd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_domain_name[{{example3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_domain_name[{{example3}}].tags is defined and not null",
"actual_value": "aws_api_gateway_domain_name[{{example3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_file_validation_disabled/test/positive.tf",
"similarity_id": "32209efdc9044e088525b422321326c3a6d649450837968a06984eb958841ef2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf",
"similarity_id": "77fa4e7bf0c2ecf023209be8b937aeef6d09c078ec2804c53fc9806a904d7426",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/negative2.tf",
"similarity_id": "74ff7ba80ed7de629006cf6ae6088231c0c5bea9d025730d558eea523af280cf",
"line": 109,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{inst32}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{inst32}}].tags is defined and not null",
"actual_value": "aws_instance[{{inst32}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kinesis_sse_not_configured/test/positive.tf",
"similarity_id": "e1e98cefb5daa25c81cb08c90b4a4255937ebe2f08666808886d2d727ef3dfc7",
"line": 38,
"issue_type": "MissingAttribute",
"search_key": "aws_kinesis_firehose_delivery_stream[{{positive5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is defined and not null",
"actual_value": "aws_kinesis_firehose_delivery_stream[{{positive5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "5a925546150e29169991bebbb29441a61d21bf295d40b4c9634c0666c9a8c694",
"line": 61,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative5}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive1.tf",
"similarity_id": "37c91425efaf2005266249ec1202652e66a5f58a1fcaf6a3af63353b938fabc5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{mainvpc}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{mainvpc}}].tags is defined and not null",
"actual_value": "aws_vpc[{{mainvpc}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf",
"similarity_id": "b688aba31df36fda9b0c1d60e06992e6dfba6669e3660b7e766cfc13e29dc07f",
"line": 25,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_logging_disabled/test/positive.tf",
"similarity_id": "cb38517d1e890b302216b8969a79d6ea9d572fa992fdfe20672e03c9c4730c8a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_route53_zone[{{no_query_log}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_route53_zone[{{no_query_log}}].tags is defined and not null",
"actual_value": "aws_route53_zone[{{no_query_log}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_without_policy/test/positive1.tf",
"similarity_id": "532e0628749b35e62484dc3c545e44837379ced4f5bf21b6981cec7544c1c255",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{foo}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{foo}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{foo}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive7.tf",
"similarity_id": "83a3b5f34b9eb8e11879eaf2a664596d1d42178e34b09295dace03de04d7f347",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive7}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive7}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive7}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive1.tf",
"similarity_id": "d33885b4752c1cd6deba1a99a227057e340558dcd42e82e1bf886d1e8cb7562c",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_route_table_changes_alarm_missing/test/positive3.tf",
"similarity_id": "6c7395a794baba6c9988754065c2b636ae9956b4145496903e4ed1bfe4aa4bee",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_route_table_changes_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_listening_on_http/test/positive2.tf",
"similarity_id": "41f4819cf71faa08ab8c1e7224157b0b08896bf5b42a8cbb3dfb4f8ca4315655",
"line": 49,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{test}}].tags is defined and not null",
"actual_value": "aws_lb[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/positive1.tf",
"similarity_id": "09552c9d72f4901a6c27d4166d11507eaf9c7e09f17e0c57a9af37c28b5d2b22",
"line": 25,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{example}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/negative.tf",
"similarity_id": "ce678c19eac6251be9ac636c6c7e7f31f80268976461050404fa6beb49e28ba0",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/hardcoded_aws_access_key_in_lambda/test/positive.tf",
"similarity_id": "aa1d0d9fd6d2fa93fa7ac9435af5359b3fa52539a4d4ce0751205d5399bc04ca",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf",
"similarity_id": "7942fe4ffb05fe2182a7065baba61b75c5fef5ffdb8af42eaf47dfe0e6161ffb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative4}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_method_settings_cache_not_encrypted/test/negative1.tf",
"similarity_id": "7e2cd7fa837fd18506c14769af66dfe98805792005b0b4e118ddcb7b468f64af",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{example}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_without_logging/test/positive2.tf",
"similarity_id": "2de1f3d740a1dcbbbe19277e30c68fb82317786adc25dfd67dd872c3a969d180",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive2}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/iam_role_allows_all_principals_to_assume/test/positive.tf",
"similarity_id": "1fc945ab6ee52928421a34739f7a32babc4350d8243f5f44ab4b31aa4b3561c1",
"line": 4,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_role[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_role[{{positive1}}].tags is defined and not null",
"actual_value": "aws_iam_role[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "d326a8dbb9f5951b20c168526f136dbf556f66c563152e3597797b44b66c111f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_cluster_snapshot[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_cluster_snapshot[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_cluster_snapshot[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "521c81505724383bfb5396504d5ebd1d46fd841fccfb65efbede5b7d4406b780",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_peering_route_table_with_unrestricted_cidr/test/negative3.tf",
"similarity_id": "a8e36842361b20aa35e38ce880f19d44fdf6bce0b8e25777ed5007cddbfa9e31",
"line": 87,
"issue_type": "MissingAttribute",
"search_key": "aws_eip[{{nat}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eip[{{nat}}].tags is defined and not null",
"actual_value": "aws_eip[{{nat}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf",
"similarity_id": "b9874e27be7e0647d7af01881182ce65386a74f7271f4e1a9a2762197b761c75",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf",
"similarity_id": "081766e2a442d300fc35d57461730db9b2e845d070016bfcc7a1e9a50154f590",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_cluster_snapshot[{{negative}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_cluster_snapshot[{{negative}}].tags is defined and not null",
"actual_value": "aws_db_cluster_snapshot[{{negative}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_function_without_tags/test/positive.tf",
"similarity_id": "d785261b8dce77ade8a40b5986bf94213399251f92b9052f778a2ff484ff75d2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{positive1}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "0dd80711add1ce6378403c30483e7369758f34744d776c49f353283172c8c356",
"line": 91,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive7}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive7}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive7}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/positive1.tf",
"similarity_id": "cb9462d2498c9b18719f6b211dad05fb729f09d97cec3c112e371e97b622f414",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{positive1}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive2.tf",
"similarity_id": "bc329eca221daf5e6014092ca2157b910aaca4e2b0b3882e8e610899ea8af0e7",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf",
"similarity_id": "3195f78cd8a542e0cc2b69e0c612503af894d467018cae708dcdd45190156146",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/negative2.tf",
"similarity_id": "bf6d88f277325c7349fd318c6e8c81adc9eff5752f89325c79dc030d45f227c7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{enabled}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{enabled}}].tags is defined and not null",
"actual_value": "aws_lb[{{enabled}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf",
"similarity_id": "a16d5ea1a614053a724e936eeeb384ec38d66281c71fd63bfbd170dada7a3ed3",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{allow_tls}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/efs_with_vulnerable_policy/test/negative.tf",
"similarity_id": "a175058a62776680ba122746d3246d3a6eec4e31f308a6b6a0f96c0d6638340d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_efs_file_system[{{fs}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_efs_file_system[{{fs}}].tags is defined and not null",
"actual_value": "aws_efs_file_system[{{fs}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/efs_without_kms/test/negative.tf",
"similarity_id": "53ed9ee035d0162c10c3e8c08c3b725ce8a5762f69b9b37d099eac76e6246a5e",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_efs_file_system[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_efs_file_system[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_efs_file_system[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/negative1.tf",
"similarity_id": "2f1f1c31fcfec200e1fc9859daa6f8af2b03b7a0ad0acb538165c7b95965594e",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_changes_nacl}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_queue_exposed/test/negative1.tf",
"similarity_id": "5e09ee363daca360c6150982522064e3604df8aa293909a7a8ecd3592bfd96be",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf",
"similarity_id": "d1bc013d22bd9b431fd0591e9dff453dc4d7a9d2c4d72327a991f24b3c155fed",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{cloudtrail_log_group}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/positive1.tf",
"similarity_id": "160cb5262627941db1594fb9e6950b0d97f90fdbf924898b6f63720cad1401ce",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecr_repository_is_publicly_accessible/test/positive.tf",
"similarity_id": "3b40f0da0d97d24220cb0b37bbf35c02a473475326118f652f3cbbe22c88419f",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_ecr_repository[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecr_repository[{{positive1}}].tags is defined and not null",
"actual_value": "aws_ecr_repository[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redis_not_compliant/test/negative.tf",
"similarity_id": "35533628d428fcf760e95a652fa5ab00a44b8083567f688fa278b6e34614a825",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf",
"similarity_id": "1101d8de10e40f8bd4dbeca5395b916a9c7ce5bbd2cdc01acb40c9738416d215",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative5}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative5}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative5}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/certificate_has_expired/test/negative.tf",
"similarity_id": "0ed3a66686058d15e17422b4fbb0548bdc5b799b9ed5e9b87d6e3600c88b3244",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_domain_name[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_domain_name[{{example}}].tags is defined and not null",
"actual_value": "aws_api_gateway_domain_name[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/alb_not_dropping_invalid_headers/test/positive2.tf",
"similarity_id": "56bf6fcaa667c64d1719827f23d2c395b6878a2d868cd84156ddfa817a1f2797",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{disabled_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{disabled_2}}].tags is defined and not null",
"actual_value": "aws_lb[{{disabled_2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf",
"similarity_id": "d4ec6345adeac1d529ac8db293520337be2d1318aa7e50352d3bd172e403f445",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{hoge}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{hoge}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{hoge}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redis_not_compliant/test/positive.tf",
"similarity_id": "20b4570b5e4a26efcf5f9bed289236093b7b46ae1c9f5d98b72ff93a0b2664e2",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf",
"similarity_id": "e3b56bc8117c209f761a5bcee62f3c87318383c21502a59b597214ec673bff87",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{b2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{b2}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{b2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_default_security_group_accepts_all_traffic/test/positive2.tf",
"similarity_id": "949a306a3308f3a06467af8857db125a7306d4c40184feffdf0d3d4009e9d8fe",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{mainvpc3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{mainvpc3}}].tags is defined and not null",
"actual_value": "aws_vpc[{{mainvpc3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/msk_cluster_encryption_disabled/test/negative.tf",
"similarity_id": "33b3deef328bef37410c6c04a01b0fad8daeb0a0bf531a592e4ee1259a295e18",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_msk_cluster[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_msk_cluster[{{negative3}}].tags is defined and not null",
"actual_value": "aws_msk_cluster[{{negative3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_changes_to_nacl_alarm_missing/test/positive1.tf",
"similarity_id": "e10ad2160d6ac745089e335b6cda69dd13c9a826d031035bb4aafdd5e8aae0cd",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secretsmanager_secret_without_kms/test/negative1.tf",
"similarity_id": "3c47dba1e9846e327a128b578dda73d118f61110f2d4df03bb7d450d10e349e5",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_secretsmanager_secret[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_secretsmanager_secret[{{example}}].tags is defined and not null",
"actual_value": "aws_secretsmanager_secret[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive2.tf",
"similarity_id": "a9c98a90172b03a72986a5a934fc73672f08fa82d9e1fcf2da300b463bd98773",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_instance_storage_not_encrypted/test/positive1.tf",
"similarity_id": "8d89f8b1b51323d94d21e4fc36308492021da41cc8d95749bc80fc133bc1a8a3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_instance[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_instance[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_instance[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_rest/test/positive2.tf",
"similarity_id": "5000c8b54e1f5c18de4cc7dc43cb5144d8000445b21f51260a0155a171b5fdd2",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_replication_group[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_replication_group[{{example2}}].tags is defined and not null",
"actual_value": "aws_elasticache_replication_group[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf",
"similarity_id": "0485215ddd3b48d8026419cedc469648bd50e6c07a621a08c0b4e31f83f806a9",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{foobar2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{foobar2}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{foobar2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive1.tf",
"similarity_id": "313358e70211b2aa3542a89e1dd0146dcd7d4db5a614befd496f95909166ddf3",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cognito_userpool_without_mfa/test/positive.tf",
"similarity_id": "e2389542084f3ba7348468fe067f1023a16a93289872cc859925bd75aae5f8d4",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_cognito_user_pool[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cognito_user_pool[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cognito_user_pool[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_redis_cluster_without_backup/test/negative.tf",
"similarity_id": "b5344e5f0dc48937a3c8af22cb5f15583372a82741e0efbc868c288725105f5a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_unauthorized_access_defined_alarm_missing/test/negative1.tf",
"similarity_id": "f7962d8c5aa507889fcd0615c483817c5724e8cef9287b202f0a4f4d86b7640c",
"line": 39,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf",
"similarity_id": "880d9fc9b2f770a9be7c1038723c1956b4a6d38878bd1e6583d889dd4e4a9734",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_config_configuration_aggregator[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_config_configuration_aggregator[{{negative1}}].tags is defined and not null",
"actual_value": "aws_config_configuration_aggregator[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/lambda_with_vulnerable_policy/test/positive.tf",
"similarity_id": "50de1f16ce95091bc912f7ba8841317ee874a7c2e9e262054c31757297dd6685",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_lambda_function[{{my-lambda}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lambda_function[{{my-lambda}}].tags is defined and not null",
"actual_value": "aws_lambda_function[{{my-lambda}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "7c871a31272c4ae39136cc911630e06f635882cec88835b888bcbee00635f257",
"line": 103,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{test-queue}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{test-queue}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{test-queue}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "87883982047b5e857bc246bd8e71e8e11616b62c965b75047f9b8e4f8cce0394",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "57b4362f2c9b2c41b471e0e188c115a892736b484e94586a6ed9de446f41112f",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_multi_region_disabled/test/positive2.tf",
"similarity_id": "87552b3ce68c7e991e907c7249c54ac17a4f495458af641b3aec9702d98cc05c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{positive2}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf",
"similarity_id": "140a94d77dc6e84835f595a6fb50fc2c9d79bd3b1f90824063ce58295923e812",
"line": 28,
"issue_type": "MissingAttribute",
"search_key": "aws_lb[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_lb[{{test}}].tags is defined and not null",
"actual_value": "aws_lb[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/batch_job_definition_with_privileged_container_properties/test/positive.tf",
"similarity_id": "50b0d6121f1baedf2144e03de9d1b6c9ed9076cc397ad685f0d4441af04d105a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_batch_job_definition[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_batch_job_definition[{{positive1}}].tags is defined and not null",
"actual_value": "aws_batch_job_definition[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_config_configuration_changes_alarm_missing/test/positive4.tf",
"similarity_id": "3a7740697e63500d62666816c41095685563f0030ade329bd195c161946c5f3f",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_AWS_Config_Change_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/service_control_policies_disabled/test/positive.tf",
"similarity_id": "6974389fb3d7caabbc30c6aa1659b4645da99d463151f04b894bcdfac89a0339",
"line": 18,
"issue_type": "MissingAttribute",
"search_key": "aws_organizations_policy[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_organizations_policy[{{positive2}}].tags is defined and not null",
"actual_value": "aws_organizations_policy[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "c0ddebf53afe007e0bfe45c1531d1a3f2e837471aa5b9aa28efe0900521837b0",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative4}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf",
"similarity_id": "87671640449d67dc448eb5bef9fd3cbeadcbabf94706084cb37b1020a7d5f9c3",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive2.tf",
"similarity_id": "3cb28a46a92d9ec5e58b4c81cc1b7ddfc2f153703d6e387dc91b2f26b6ffa60c",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/stack_without_template/test/positive.tf",
"similarity_id": "94bd70f63e5b28d52ebe2a594a5a6c8e91f45a88603bd3bc7acb92f2de8908bb",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudformation_stack[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudformation_stack[{{positive1}}].tags is defined and not null",
"actual_value": "aws_cloudformation_stack[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive1.tf",
"similarity_id": "6641f2907e698ff4339895c7a12ff6449aa58873d52b42cfd8d58ea58ecc10a9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_vpc[{{main}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_vpc[{{main}}].tags is defined and not null",
"actual_value": "aws_vpc[{{main}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_root_account_use_alarm_missing/test/positive1.tf",
"similarity_id": "e64bbb0a3a0becc5cafd664fd8e62609e2d9546a8ec128b9c8cc28a3000fc2a4",
"line": 40,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_no_mfa_console_signin_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/policy_without_principal/test/negative1.tf",
"similarity_id": "0bdc8f4e6320805d81e6e8e22e49b375132a2cf2ffd25570e78f08e8611ca657",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{secure_policy}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{secure_policy}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{secure_policy}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/positive.tf",
"similarity_id": "df900952faef7848302a280a53960a09dee624ac89d009415f5cd16faf0ba3a9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf",
"similarity_id": "b57a9cadd8183f300a98687aba9372f8c58d400be75d5a297c46776148490535",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_with_sse_disabled/test/negative1.tf",
"similarity_id": "550a00588b31e605da782c1aa8b6bf2bb9e2d902d523ec40f90189008403366d",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sqs_queue[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sqs_queue[{{negative1}}].tags is defined and not null",
"actual_value": "aws_sqs_queue[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/negative1.tf",
"similarity_id": "8a622b3a313decf89e16ae1d5cdd5ccf83e7cc1bad2b672e82447520294cf99b",
"line": 61,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/positive1.tf",
"similarity_id": "a37f57eb3663501b2807b523a87af9bceefaeac497d97ac445563e88d485c902",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{CIS_CloudWatch_LogsGroup}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf",
"similarity_id": "f7a4bdb1d71f1d9fdd75a26b69ba5374136cfb14ea8b908d338e65540145582a",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{positive3}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{positive3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf",
"similarity_id": "dd87fa508d2dc1164be7b6d4d6c0cfc328a931d8a13f472064d33d9cde4b4bfa",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf",
"similarity_id": "fcafc04f0436f043a3e96f82e5781d5e6fd8503b19f3fe7ec8fb2cd281ab8990",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{foobar}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{foobar}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{foobar}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_network_gateways_changes_alarm_missing/test/negative1.tf",
"similarity_id": "21decdd58927b41d4a493e3983846b6452ade1efeb092a674a1cece45ed0148b",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_network_gateway_changes_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "b30672d78bbb6838e056bd11b4314ba3e07bf02d1d973fb3841b5f2022697aa7",
"line": 16,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive3.tf",
"similarity_id": "4851daee2c0d1a898e82f67d87c9ddcd3727506838b9d21d49ac092fec7dd1af",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{example0000}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{example0000}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{example0000}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/public_and_private_ec2_share_role/test/negative2.tf",
"similarity_id": "f2e8d2e11b10be3f7b6b6837fdf37435c09a90d2150ffbceff1359319fcdda20",
"line": 66,
"issue_type": "MissingAttribute",
"search_key": "aws_iam_instance_profile[{{test_profile4}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_iam_instance_profile[{{test_profile4}}].tags is defined and not null",
"actual_value": "aws_iam_instance_profile[{{test_profile4}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "87be0de6ab2fd60ca0d74fecbc385e00289636f864877ebe9c0ce63ecd82ef07",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_iam_policy_change}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_is_publicly_accessible_for_subscription/test/negative.tf",
"similarity_id": "0e4d096b9e40efa9af714d4561fcb748406d688259bb5b87beddf38374acd29a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{negative1}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf",
"similarity_id": "f03baaa27f8c837d97fdbd9d3e194b604a286b5bd4f8c643ea50ace15cbf622d",
"line": 46,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_security_group[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_replication_group_not_encrypted_at_transit/test/positive2.tf",
"similarity_id": "87243a3303da420997d3d18fc2a6e27a0071b5931209e7c27cc5b095c99e8cbd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_replication_group[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_replication_group[{{example}}].tags is defined and not null",
"actual_value": "aws_elasticache_replication_group[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/vpc_flowlogs_disabled/test/positive2.tf",
"similarity_id": "52d6ee7fb5aad8b7620ff3aa604aa51e073e1e2c2aa0f8521ade710451affe4b",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_flow_log[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_flow_log[{{example}}].tags is defined and not null",
"actual_value": "aws_flow_log[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_aws_organizations_changes_missing_alarm/test/negative1.tf",
"similarity_id": "7bdb3b505e086a8a9ff635fac05bc14c989e8cc78caf5fb32f6da520598efe8b",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_aws_organizations}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_with_cloudwatch_logging_disabled/test/negative.tf",
"similarity_id": "80c078fed0ecee71812797bf777b736c7939b9c09aabf8e612bfe7dfdee0aa52",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_log_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_log_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_log_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_iam_policy_changes_alarm_missing/test/positive1.tf",
"similarity_id": "e54023286799116b5615729250c77cd94324b2838265d1170002b8f1b928006f",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{cis_alerts_sns_topic}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{cis_alerts_sns_topic}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ecs_service_admin_role_is_present/test/negative.tf",
"similarity_id": "b96228815033408893ce8fd1db2cab1aa22a98d6e7a15695a9ae1c6ac2dcc8f6",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_ecs_service[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ecs_service[{{negative1}}].tags is defined and not null",
"actual_value": "aws_ecs_service[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sagemaker_notebook_instance_without_kms/test/positive1.tf",
"similarity_id": "7b71d1bbf0dfd7d94acc74db6a744ba4b63a5da80f047a0e0da35169e356068e",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_sagemaker_notebook_instance[{{ni}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has tags defined other than 'Name'",
"actual_value": "aws_sagemaker_notebook_instance[{{ni}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/config_rule_for_encrypted_volumes_is_disabled/test/positive.tf",
"similarity_id": "8781b118e92c6cb375673038a3b0c6fc45fe8ab85fc45eda36927bc77aaac83e",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_config_config_rule[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_config_config_rule[{{positive2}}].tags is defined and not null",
"actual_value": "aws_config_config_rule[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/negative.tf",
"similarity_id": "7009c367e82c41f46df83dc6debe9d3773acd115793e6be228caa5b25f9d0bac",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_volume[{{negative1}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_volume[{{negative1}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_volume[{{negative1}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/config_configuration_aggregator_to_all_regions_disabled/test/negative.tf",
"similarity_id": "5bfe6770e71dc946ae0b8ee4820c83a84a1eb5f6fac48784fa1a7ec9f915c53e",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_config_configuration_aggregator[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_config_configuration_aggregator[{{negative2}}].tags is defined and not null",
"actual_value": "aws_config_configuration_aggregator[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_access_logging_disabled/test/positive1.tf",
"similarity_id": "677c8278ad8600fc8674ba7c9f975f5579bca11214be0970253b6d544371a808",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_apigatewayv2_stage[{{postive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_apigatewayv2_stage[{{postive2}}].tags is defined and not null",
"actual_value": "aws_apigatewayv2_stage[{{postive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "302075dff2a31fc6bc75e9fde67f1a221088d5da68ac01b51013ebd96815eacc",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{negative2}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "ae93eaa8e8f54e1bfbf1a4c0ad5de0151e93aef56e732de444da3d9ef9172ca6",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/secretsmanager_secret_encrypted_with_aws_managed_key/test/positive2.tf",
"similarity_id": "5a9008d0d0138a984503ca53e2f51e478fe6cfde4178142bbe30051dcab2d506",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_secretsmanager_secret[{{test}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_secretsmanager_secret[{{test}}].tags is defined and not null",
"actual_value": "aws_secretsmanager_secret[{{test}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/resource_not_using_tags/test/positive1.tf",
"similarity_id": "08a2d4c9429eec1283d35f14ed8e628c487a92fc2ad70fb90bb50a318e5f796c",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_acm_certificate[{{cert_2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_acm_certificate[{{cert_2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_acm_certificate[{{cert_2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/negative.tf",
"similarity_id": "7a132fee2deb850f513fec0e5a8c05b6ad272a836551874715c2206d142e846e",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{example}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{example}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{example}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/ebs_volume_encryption_disabled/test/positive2.tf",
"similarity_id": "e99ae1aa232256214d6ac75f69c61d7ca59e958b16a587363f151cc8834862cf",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_ebs_volume[{{positive2}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_ebs_volume[{{positive2}}].tags has tags defined other than 'Name'",
"actual_value": "aws_ebs_volume[{{positive2}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/ec2_instance_using_api_keys/test/positive5.tf",
"similarity_id": "b89a5d79bd15d921bcf23099a523c1cdcd64077eb6bd136b2808adad61fbe66a",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_instance[{{positive5}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_instance[{{positive5}}].tags has tags defined other than 'Name'",
"actual_value": "aws_instance[{{positive5}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/elasticache_nodes_not_created_across_multi_az/test/positive.tf",
"similarity_id": "75d2b7920b52c18409959bacb4fc583cdce0017ea304566c0dbe5841ee4df2ef",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/positive2.tf",
"similarity_id": "6703a70ede7cd94c9d9b74bfbf4f6d63ead29d11a3ffe4489a08044cdd4a830a",
"line": 9,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{example000}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{example000}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{example000}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/docdb_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "5169079fcfb849c9e81452116aff756bddde8694e23ee2c1c0402e8fe5849d98",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_docdb_cluster[{{docdb}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_docdb_cluster[{{docdb}}].tags is defined and not null",
"actual_value": "aws_docdb_cluster[{{docdb}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_deployment_without_access_log_setting/test/negative1.tf",
"similarity_id": "692d8ca81cf118529c0c61d2cee69fd0b470b73ff90a4cd7c99c58374af3bed0",
"line": 11,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{example0}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{example0}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{example0}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/kms_key_with_no_deletion_window/test/positive.tf",
"similarity_id": "d286ccfe47ef661cf5cd889c56839865a27f821ecc85d02b1ac5bdd55f095a9c",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_kms_key[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_kms_key[{{positive1}}].tags is defined and not null",
"actual_value": "aws_kms_key[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/stack_notifications_disabled/test/negative.tf",
"similarity_id": "2e8928c15569c8f1ee1579fc9e6db4c07a800a0d85d16c3a194b1750ff68615b",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudformation_stack[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudformation_stack[{{negative1}}].tags is defined and not null",
"actual_value": "aws_cloudformation_stack[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf",
"similarity_id": "dd381de9d3f2bc4b9643ddec720880ab11f591e257e3ff28e7686820ed54614a",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}].tags is defined and not null",
"actual_value": "aws_security_group[{{negative3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/redshift_cluster_without_vpc/test/negative.tf",
"similarity_id": "8a0f0afa6d548aa118b6a82ab18acf19588e25ed746aebe0759b260947d28235",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_redshift_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_redshift_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_redshift_cluster[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access_cidrs/test/positive.tf",
"similarity_id": "1aa77ed9f6defc4e886074d8b19fb827a1f667b9397a84bd9a4110ead7dda527",
"line": 26,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{positive2}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sns_topic_not_encrypted/test/negative.tf",
"similarity_id": "c7dd38d64d677270b9d504e080b48d7b439df8baf778d722250919b2886bda46",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_sns_topic[{{test2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_sns_topic[{{test2}}].tags is defined and not null",
"actual_value": "aws_sns_topic[{{test2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rds_database_cluster_not_encrypted/test/positive1.tf",
"similarity_id": "a79f146a43d4456332e8f82ec105c95ec0a6ce49a09c108290c01c94be1f03e1",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_rds_cluster[{{example2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_rds_cluster[{{example2}}].tags is defined and not null",
"actual_value": "aws_rds_cluster[{{example2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/api_gateway_without_ssl_certificate/test/negative.tf",
"similarity_id": "72e78cbcd82758fb522c583f9f26d59435066cab71316569f7c421ea9647f438",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_stage[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_stage[{{negative1}}].tags is defined and not null",
"actual_value": "aws_api_gateway_stage[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf",
"similarity_id": "27496f8453c01af6020c31c0f8bb66adf340d2d9831d5292e1c2974d17d95dc7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{b}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{b}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{b}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/rest_api_with_vulnerable_policy/test/positive.tf",
"similarity_id": "32c367d0c6d39633be995a1b5fd139e2837c1a0e6e8056ed97e3b1619067256d",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_api_gateway_rest_api[{{api_gw}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is defined and not null",
"actual_value": "aws_api_gateway_rest_api[{{api_gw}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "19aabad4f15ebeef176560b97edaf0d8ab5f14a0c3857189c9df8857c2d2bf63",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_cloudtrail_configuration_changes_alarm_missing/test/positive3.tf",
"similarity_id": "3e306bf41f303bc2fb3a70159ebf6ffae3037a5590853e4aacb7e92d40f6ea85",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_cloudtrail_config_change_cw_alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/mq_broker_logging_disabled/test/positive.tf",
"similarity_id": "414459e9120d1c2db94e518f0f39d10e05573c63fc3c543dc47823402d7f6527",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "aws_mq_broker[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_mq_broker[{{positive2}}].tags is defined and not null",
"actual_value": "aws_mq_broker[{{positive2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf",
"similarity_id": "7ebc38adfd68ba928e8b5f1a4559b703313c81ae00733ad8fc526b63633ec478",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf",
"similarity_id": "3574319f06ac50530ea75de41741e64a27356835774538b286dae3568a0925e9",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{positive1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/no_stack_policy/test/negative.tf",
"similarity_id": "06f473420868c8e813244902937352a115c34e523bc9aabcf2c7ef88d59c6ba4",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudformation_stack[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudformation_stack[{{negative2}}].tags is defined and not null",
"actual_value": "aws_cloudformation_stack[{{negative2}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf",
"similarity_id": "44fedd3d0e9852f493cd03729c9b667c94955bba75eb872f309f8b9e527fbe3c",
"line": 10,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{log_bucket}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{log_bucket}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{log_bucket}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/db_security_group_open_to_large_scope/test/positive.tf",
"similarity_id": "04c54fa534401d08b72cc021c163b00d3f7200f7f03b3daed1e830447ba22291",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_db_security_group[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_db_security_group[{{positive1}}].tags is defined and not null",
"actual_value": "aws_db_security_group[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/negative1.tf",
"similarity_id": "224ef00b57315cbee0d10def11356aff91941d6bbbf433be7ee821649d472659",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_vpc_changes_alarm_missing/test/positive3.tf",
"similarity_id": "88dd6632bec2e94a42a6ecc01280c615ef11760dce5e111be53f09f00eb4385b",
"line": 12,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{CIS_VPC_Changes_CW_Alarm}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "9f5724024ac91244a6b54b8d3725fa967f989df14d26c1cf055d8b3768623a1c",
"line": 25,
"issue_type": "MissingAttribute",
"search_key": "aws_route_table[{{private-rtb}}].tags",
"search_line": 0,
"search_value": "",
"expected_value": "aws_route_table[{{private-rtb}}].tags has tags defined other than 'Name'",
"actual_value": "aws_route_table[{{private-rtb}}].tags has no tags defined"
},
{
"file_name": "assets/queries/terraform/aws/cloudwatch_disabling_or_scheduled_deletion_of_customer_created_cmk_alarm_missing/test/positive3.tf",
"similarity_id": "0062acffb52169c9082bcd1a98ff5f7a87cae846e534a050c1c6458931330c47",
"line": 13,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is defined and not null",
"actual_value": "aws_cloudwatch_metric_alarm[{{cis_disable_delete_cmk}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_has_public_access/test/positive.tf",
"similarity_id": "9d05f0f68a5dad58d0e792151ea1214aeba6e193f2030f558479f0b73c06a5be",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_eks_cluster[{{positive1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_eks_cluster[{{positive1}}].tags is defined and not null",
"actual_value": "aws_eks_cluster[{{positive1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf",
"similarity_id": "f14eb8ec31b04320c7e7b05ba8c4988cbaa28665dff7fb317d8c855b6eb02f05",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_s3_bucket[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_s3_bucket[{{negative1}}].tags is defined and not null",
"actual_value": "aws_s3_bucket[{{negative1}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "76047c4a4e7cba58c78b4c22801cd82cc7135c2cbe7e0a55a346b24091400479",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "aws_cloudtrail[{{example3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_cloudtrail[{{example3}}].tags is defined and not null",
"actual_value": "aws_cloudtrail[{{example3}}].tags is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/memcached_disabled/test/negative.tf",
"similarity_id": "49100f90b87e61710dc47a0165e8d552e911bb53a394c9a9021dfee6d579b201",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_elasticache_cluster[{{negative1}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_elasticache_cluster[{{negative1}}].tags is defined and not null",
"actual_value": "aws_elasticache_cluster[{{negative1}}].tags is undefined or null"
}
]
},
{
"query_name": "Security Group Not Used",
"query_id": "4849211b-ac39-479e-ae78-5694d506cb24",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group",
"severity": "INFO",
"platform": "Terraform",
"category": "Access Control",
"description": "Security group must be used or not declared",
"description_id": "eff2383a",
"files": [
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "b34de59e36b34a4c19518a6e1ec353aacc1f0e996ad2f68c77b4c94aee19ef66",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf",
"similarity_id": "dc28977b6fe46ebd23c1da788a21849794afec7ff88a83ae7e4b568f0cab2b44",
"line": 8,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[allow_tls]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[allow_tls]' is used",
"actual_value": "'aws_security_group[allow_tls]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "47c5bc4571b7341d7d35f2f25d310a7770c8247d2c18651b2ef273702d73da69",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive1]' is used",
"actual_value": "'aws_security_group[positive1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf",
"similarity_id": "cc14c34ecf0b1d52eb75640a2c6575a5270c8111a859a95b4f1c90219a98e1aa",
"line": 17,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative_rdp_2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative_rdp_2]' is used",
"actual_value": "'aws_security_group[negative_rdp_2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/negative1.tf",
"similarity_id": "e849a2f5e998cba335bcfcc448d76a78a6d9374280b64e281181b389edb05877",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[allow_tls]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[allow_tls]' is used",
"actual_value": "'aws_security_group[allow_tls]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "1079df6156741ed31a5989b95d98656352ab73401116dc8c24e58e470479fec0",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative3]' is used",
"actual_value": "'aws_security_group[negative3]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf",
"similarity_id": "0f0900a6fc4525d5f829110cd31568675297cd052d7d5614190d743124d025be",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "216dd7f494b888a497c227775ce036f483511eb7dad48e8cc2965dec635fe372",
"line": 58,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[allow-public-outbound-sg2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[allow-public-outbound-sg2]' is used",
"actual_value": "'aws_security_group[allow-public-outbound-sg2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive2.tf",
"similarity_id": "e55e34b27f1663115f9727fd9882dfbf8aaad2ff02b8acf0253027acb9acf16f",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf",
"similarity_id": "fe7d2e8a70f2026b00b3fad43a6422b112ab7784f7e176de463dc85a211e2887",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative2]' is used",
"actual_value": "'aws_security_group[negative2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "a91e0c532a2e0506b42ebad34088f61e924948d45f684f5af3f3af1a44d98191",
"line": 76,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive6]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive6]' is used",
"actual_value": "'aws_security_group[positive6]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "9549b66a01e7d1b081807d3e10352c06582891c740a675e25ed1beffb58193d5",
"line": 53,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[allow-public-outbound-sg]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[allow-public-outbound-sg]' is used",
"actual_value": "'aws_security_group[allow-public-outbound-sg]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf",
"similarity_id": "0c4b0988118981b6dafb6daad599122a0d8326bf0c7b44f8bc97c8260b97acf5",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[allow_tls]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[allow_tls]' is used",
"actual_value": "'aws_security_group[allow_tls]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "8b4e32fbf123be0405ac7075ed7c1edb6764a03a6c0f600e0bbd043fe7fd5f30",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "e9246e7ecd3569fae5a0663289fa276575bb8d768221093447162ab7ec4cc18a",
"line": 46,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive4]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive4]' is used",
"actual_value": "'aws_security_group[positive4]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "651ab242e3ed0e3232e9ecc1338bb81c13a04cb6d5395c6dcfaae561e6ec3747",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative1]' is used",
"actual_value": "'aws_security_group[negative1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "9119d6bf141f7ae79f599c17792116ce832a1e31c79903f3470a4121148e65e8",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative1]' is used",
"actual_value": "'aws_security_group[negative1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "b09959d54b5ac1e3d7dbb0cbe0f86f688ca480ade3bc4f57222b8710cdaab200",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative2]' is used",
"actual_value": "'aws_security_group[negative2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive8.tf",
"similarity_id": "b0fb6463e23378a02e2e53c337e1b1c2d991cf371bdeb9f3e6480f437c6fa250",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive8]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive8]' is used",
"actual_value": "'aws_security_group[positive8]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "a0a3139505f7bbcd611f4565b35010aed1622a591f24f4f840f290702f2f7c3b",
"line": 50,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[public-internet-sg]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[public-internet-sg]' is used",
"actual_value": "'aws_security_group[public-internet-sg]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "0b14bf9f8abfe6aa8342f5061208b923a5fbaac7f4690a4f648e02bddfe75d25",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative1]' is used",
"actual_value": "'aws_security_group[negative1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf",
"similarity_id": "a09497235def90f1eab9bde9aaa2515b8445b2e6f1400dd4b7cdcd19e93b8762",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive1]' is used",
"actual_value": "'aws_security_group[positive1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf",
"similarity_id": "c635380bac05c17e10f99691ed4255aec4ca1abfa4be40e2f68c08faaf40e0f8",
"line": 7,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative2]' is used",
"actual_value": "'aws_security_group[negative2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf",
"similarity_id": "cd1febaf834c4d8ec3af6c2564a91cccc9efa56a0758769565d01189a25116f3",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive3]' is used",
"actual_value": "'aws_security_group[positive3]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive5.tf",
"similarity_id": "92b08ca77f922f792758fd694e9fc60488e6f22ee54ac6271e9a4a666a588095",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive5]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive5]' is used",
"actual_value": "'aws_security_group[positive5]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf",
"similarity_id": "ecda9b69ab0e79a39243a5e0501cf01d3f5ccf44d92d4b78c743f5e4df5e05f0",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[allow_tls]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[allow_tls]' is used",
"actual_value": "'aws_security_group[allow_tls]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "910c495a10ef47ae63670f61e44a2e7b241014d2c94ee66aca6b0bcc4091fbc9",
"line": 76,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive6]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive6]' is used",
"actual_value": "'aws_security_group[positive6]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/negative.tf",
"similarity_id": "8822ed74f1b9d332752c9ef43df283f1d70a4f7e813b566daf7e7724ace7fe8a",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative1]' is used",
"actual_value": "'aws_security_group[negative1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "a2bd20a1fcc7064cdc9668ce502200a7232c2e493cddc69a428d69886c4afa2c",
"line": 61,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive5]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive5]' is used",
"actual_value": "'aws_security_group[positive5]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf",
"similarity_id": "29b69e4c381ab151863df423323d370f2dde43322ec602c61a0cda9bfb6e4acc",
"line": 26,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf",
"similarity_id": "e84114fdc3e07676e30a9a18529cf260ab319e3f09c638e28e108ae7460de17a",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive1]' is used",
"actual_value": "'aws_security_group[positive1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf",
"similarity_id": "0844f97e566c95a7a7a29e760a31e011fa8ea2393d2463649543b83e12dcdf7e",
"line": 2,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative1]' is used",
"actual_value": "'aws_security_group[negative1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive4.tf",
"similarity_id": "33dc6947723d8c375d323a85c0fb359e8bdef2064fb8c55bf58473b2457f6c21",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive4]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive4]' is used",
"actual_value": "'aws_security_group[positive4]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative5.tf",
"similarity_id": "ffa16e12728f9e0505e07000dd4fe2222ca948da262ba455b40a96eacecfe67c",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative5]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative5]' is used",
"actual_value": "'aws_security_group[negative5]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "b5d2974424ee695207aea177f2cb0564e43e9557aff46635ee90b1b20631d2c4",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive1]' is used",
"actual_value": "'aws_security_group[positive1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "d322571bdc80e01ba976aae4f31d4f0cb4077aa7037caacb0f3e6a9e9d2360cd",
"line": 106,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive8]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive8]' is used",
"actual_value": "'aws_security_group[positive8]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "ba7b211e54bbd61536a9e92c90493294de1b3e795db86cd6eadb70496eb37172",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative3]' is used",
"actual_value": "'aws_security_group[negative3]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative4.tf",
"similarity_id": "85550e4d81596ef63fac7f8b73c8be29469e750bb4f79eb25d46cba32ef8075f",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative4]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative4]' is used",
"actual_value": "'aws_security_group[negative4]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "4b474e5eab73dd28051e418f6d88d3ba6603074cb502dd30553a2e497cd4a875",
"line": 76,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative6]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative6]' is used",
"actual_value": "'aws_security_group[negative6]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "970b6ae9b54bc9656952dbd86602f6872f9ca2fda1e337238b0ab239c696cd09",
"line": 91,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive7]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive7]' is used",
"actual_value": "'aws_security_group[positive7]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive6.tf",
"similarity_id": "9e503201ba640d6a6a0036ccf71576206d33dc737878f95dfb9dfa5669172a2b",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive6]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive6]' is used",
"actual_value": "'aws_security_group[positive6]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf",
"similarity_id": "44144dc84cc32ce00ef6081cac87492c058b862dfa05b5e0947a3866640200db",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf",
"similarity_id": "6fb86ee07fa3ab4a26faf6ed504b5e31f5312329e7712be3a5aaba49baa5473b",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive1]' is used",
"actual_value": "'aws_security_group[positive1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative1.tf",
"similarity_id": "1c6871ace99b13429234ecd360e86d39ce4b5560b94cca1bd33be9ef50c4acb1",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative1]' is used",
"actual_value": "'aws_security_group[negative1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "8802e064969bc916d4ef02f06c9c47892d2f3bb4eea6c11aba564085d31d424b",
"line": 46,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative4]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative4]' is used",
"actual_value": "'aws_security_group[negative4]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive7.tf",
"similarity_id": "bd267f1f2745ba7ad91ebff57611c6c9e54fd1321b8dea14d5acca714207b4b6",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive7]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive7]' is used",
"actual_value": "'aws_security_group[positive7]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "abd08f520c5633eed72885d441db5a5936387c4ae3d7db9c60e9872bd777f4d6",
"line": 61,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive5]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive5]' is used",
"actual_value": "'aws_security_group[positive5]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "c95c36535d0a7df2c176b0810f6e5d48a51f4f579f2a67e68cd3d2018699a00a",
"line": 46,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive4]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive4]' is used",
"actual_value": "'aws_security_group[positive4]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf",
"similarity_id": "ee144dbb3085387c863df92f0e41c0edd378c451341a233093f83b4be1ee2539",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/security_group_without_description/test/negative1.tf",
"similarity_id": "9d9754ff06cafa80f5475027c863e8913007c0d76626b1180a5cf2d638996b67",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[allow_tls]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[allow_tls]' is used",
"actual_value": "'aws_security_group[allow_tls]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/negative.tf",
"similarity_id": "ae737bb212b1cfb8a2c806120abb34711cbc63025a8c15487961dd5801395414",
"line": 61,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative5]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative5]' is used",
"actual_value": "'aws_security_group[negative5]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/positive.tf",
"similarity_id": "8ee3d3a402aa43b6e3f2cf54c44bd8fccc285e9a0d0bf7749fdf16cd6af15057",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive3]' is used",
"actual_value": "'aws_security_group[positive3]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative6.tf",
"similarity_id": "1b16280ab89e00b2f2c57b95936f5a209c7d76840fc62ee9e39618c4b13adf1f",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative6]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative6]' is used",
"actual_value": "'aws_security_group[negative6]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "474863073ae8b9ecc66d74c96204b36a3c0a32a18265bb861fc9691c62cb5ca4",
"line": 16,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative2]' is used",
"actual_value": "'aws_security_group[negative2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative2.tf",
"similarity_id": "3d7d71e2acd96134a31a44c4888dd582061f87e9a4296654a353724b54e4149a",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative2]' is used",
"actual_value": "'aws_security_group[negative2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf",
"similarity_id": "bc83bbaaef7e527400c6f92f17637ed599e8ac54e48d4fd51534190b381902e3",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive1]' is used",
"actual_value": "'aws_security_group[positive1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "f4c4b1830fcf0beb1dc337de174fd08fa644a25dfa5f85412ebe61502dd8573a",
"line": 76,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative6]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative6]' is used",
"actual_value": "'aws_security_group[negative6]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "e93ee550ce0ee01418b4a1c02a5e048a807c14670570c7512f7ab5d50fd4a274",
"line": 15,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative3]' is used",
"actual_value": "'aws_security_group[negative3]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf",
"similarity_id": "7e073fef54b77d57fa937bc30efb9239c7ca635f391827f864da47aca36ac61b",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive1]' is used",
"actual_value": "'aws_security_group[positive1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "8f046721e55cb8c7c1d792300e6509f2765fb444819c40fae9c3cee98b3ea794",
"line": 6,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative2]' is used",
"actual_value": "'aws_security_group[negative2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "4d4a207a6527f23a4692690dbb93ce8956dd3262df1bf934e6924e0bc12cd1f9",
"line": 91,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive7]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive7]' is used",
"actual_value": "'aws_security_group[positive7]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "73f99f67ba58819a427b3ebc2195436342b23865ad1b69a96276d71f43801826",
"line": 106,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive8]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive8]' is used",
"actual_value": "'aws_security_group[positive8]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "36165878b6d660e01bb0e87cf7c9d160084eede23de3db5a5305ec2882bf6389",
"line": 61,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative5]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative5]' is used",
"actual_value": "'aws_security_group[negative5]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive1.tf",
"similarity_id": "59f6892722fb687fc6e9146824f4083677d37b4ce4ae2d1bf3001b1566659e08",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive1]' is used",
"actual_value": "'aws_security_group[positive1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf",
"similarity_id": "b07dd9f1938ae90bc88bb632d5005d911ea42b641ade6af94d3bd966a9f9a678",
"line": 14,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_entire_network/test/negative.tf",
"similarity_id": "3b39fe2fbe598d59b160f091d9372563ffc7643f2f0031ae85669b3c83c7f651",
"line": 46,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative4]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative4]' is used",
"actual_value": "'aws_security_group[negative4]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf",
"similarity_id": "76b7c3aaf1da33fac752d44d1160f90bb008fec161489243005ee2beb7278e5a",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative1]' is used",
"actual_value": "'aws_security_group[negative1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_small_public_network/test/positive.tf",
"similarity_id": "11fa9ac15d69d8123ce1fb038f3086a7621d7c7fcc4fc40470372a5bef90a172",
"line": 31,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive3]' is used",
"actual_value": "'aws_security_group[positive3]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf",
"similarity_id": "d9265eeefbc0892b393fd33b7d3188f7595eee896631bff626666ae606131752",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive2]' is used",
"actual_value": "'aws_security_group[positive2]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/negative3.tf",
"similarity_id": "79736e14b588a95ce6d2b547b4433187e32f6b99348adbe8b12f98af96dd9547",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative3]' is used",
"actual_value": "'aws_security_group[negative3]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/sensitive_port_is_exposed_to_wide_private_network/test/positive3.tf",
"similarity_id": "a9edad357d7df714428d702fd554dcb88855d77ed56f94add9b002e863b3c896",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[positive3]' is used",
"actual_value": "'aws_security_group[positive3]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf",
"similarity_id": "d4e7db0358e3d6347e46e46bbdd7e88f2a0820270b40061629d50a192091bded",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative1]' is used",
"actual_value": "'aws_security_group[negative1]' is not used"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf",
"similarity_id": "36440f30c6b51ef6561c700d8c4a8502d89631075c7477858c39dc84bb228f10",
"line": 1,
"issue_type": "IncorrectValue",
"search_key": "aws_security_group[negative3]",
"search_line": 0,
"search_value": "",
"expected_value": "'aws_security_group[negative3]' is used",
"actual_value": "'aws_security_group[negative3]' is not used"
}
]
},
{
"query_name": "Security Group Rules Without Description",
"query_id": "68eb4bf3-f9bf-463d-b5cf-e029bb446d2e",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "It's considered a best practice for all rules in AWS Security Group to have a description",
"description_id": "cee242dd",
"files": [
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/negative1.tf",
"similarity_id": "2dc0890b59a106e2cc426d77c23e9c522a9a7d035f1e09574ef6e25d8bc0424d",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/negative.tf",
"similarity_id": "3daaac79ee6edcaf76dcc89b9d01d077cce8b198635e77101b7af5e926ed8641",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative1}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative1}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{negative1}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/positive.tf",
"similarity_id": "4862ce071bb1d363b000bb53ee240dd6ce35c559be4b0e6d83e1fdc9b7e7314a",
"line": 58,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow-public-outbound-sg}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{allow-public-outbound-sg}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/positive.tf",
"similarity_id": "100519cbdcf3df4d0211a20cb28c13adcd5d3a41b135d2503ebfcc726c54b90f",
"line": 18,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf",
"similarity_id": "45afdd7085631fae75df9b1cc77c348dc1e8205c8d9ed4247dbf6451bd4dbad2",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "8b5418ea08b72998227db1ccdd96661374704e9dd758d77b927ebb078a84251c",
"line": 62,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{public-internet-sg}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{public-internet-sg}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{public-internet-sg}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unknown_port_exposed_to_internet/test/positive.tf",
"similarity_id": "f363c10a06cbd3031d28c22bb804d8fe9ac6ea983fd34c5cecf6c09f9e3470ff",
"line": 31,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "411575ac5d72e413a809b85a05e761ba96e7633770e49f89b40c9e1df4e45bd5",
"line": 8,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative2.tf",
"similarity_id": "8db84596a4f3c9ed090cb85b1ba47ec6bff3e2bd46a4fa67eb6e30f1128c002a",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf",
"similarity_id": "e6462b6dc7888e2303da32d39a6ca6492a7f970dd6ffbfb0661983a49eb49f15",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive2.tf",
"similarity_id": "cd5b8301be50491b2efdb0fc76328180ba90a0dfcc92d4f0cfa27574d1bc9035",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf",
"similarity_id": "78e5e7cadcb973bb9b1edd29dc451d181fbc58bce43d62058e4271a87ce9a688",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sql_analysis_services_port_2383_is_publicly_accessible/test/positive.tf",
"similarity_id": "e364258f261f1f792e394a9fa474cc907c412e6b7b152056fa142293c8e3d81d",
"line": 19,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/dynamodb_vpc_endpoint_wihout_route_table_association/test/negative.tf",
"similarity_id": "66303822c8f1bb7301836bc3106b13500cb007ebda808c4055f6c6de042eaf03",
"line": 63,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow-public-outbound-sg2}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{allow-public-outbound-sg2}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf",
"similarity_id": "630f14396cdf3166c5ac459ba9b4e3011129ee94ea36e24575884f1b8641aae5",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{negative2}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf",
"similarity_id": "22cb57ab0377190165707a44fecf388ba1c081fc3bad1e7f064c3b5be49902e0",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive3}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive3}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{positive3}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf",
"similarity_id": "fccd7ce54c2f81017555931784cea70f2e01361f00e4ac8a03695c0040ad0964",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{allow_tls}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_with_unrestricted_access_to_ssh/test/positive1.tf",
"similarity_id": "22b988c42c73026fb8616bb9756b84ec39d8874a19554c42878fe3bb8c747ac5",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive1}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive1}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{positive1}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/sqs_vpc_endpoint_without_dns_resolution/test/positive1.tf",
"similarity_id": "3c150a59c35c8bd3e463e4f250c4ebbd6f99d2c9323f6a8bf33b682f92be0de2",
"line": 55,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{public-internet-sg}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{public-internet-sg}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{public-internet-sg}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/positive1.tf",
"similarity_id": "f0287963b35b539518c81d5e5705038c7a093b37ccd86e04984a5cc2ccfcf7c8",
"line": 22,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_groups_not_used/test/negative1.tf",
"similarity_id": "18976e48fb2ec3241f93fb5eabce67d71feb122559e9703096eec271454f8caf",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "646e5183aad86fcdb33b2dbc958c0021df017a383467ea1a8e727247723f3412",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{negative3}}].ingress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_rules_without_description/test/positive1.tf",
"similarity_id": "a823d1d90808d0393349ec071a2d231c19f39d83371b1dbe39c1061428f233ba",
"line": 14,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}].egress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}].egress description is defined and not null",
"actual_value": "aws_security_group[{{allow_tls}}].egress description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/positive.tf",
"similarity_id": "2bc8be5c1319dd1601fab22812dd209065f13deb48748dfd74c18d95f82d89f1",
"line": 18,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}].ingress",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}].ingress description is defined and not null",
"actual_value": "aws_security_group[{{positive2}}].ingress description is undefined or null"
}
]
},
{
"query_name": "Security Group Without Description",
"query_id": "cb3f5ed6-0d18-40de-a93d-b3538db31e8c",
"query_url": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group#description",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "It's considered a best practice for AWS Security Group to have a description",
"description_id": "bc535d27",
"files": [
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf",
"similarity_id": "97295dc3bd259c7e904b577e51bd58c118a70713285e524a540cb130ef33029a",
"line": 17,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative_rdp_2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative_rdp_2}}] description is defined and not null",
"actual_value": "aws_security_group[{{negative_rdp_2}}] description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive2.tf",
"similarity_id": "cc27ed549e2644065d4800aa7d84131465c07608116018b6ef0b57e894e04434",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive2}}] description is defined and not null",
"actual_value": "aws_security_group[{{positive2}}] description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative3.tf",
"similarity_id": "6b9ceea4e2161112b8bceecf47b8345cec460bd8c845ce32de6676d69371e044",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}] description is defined and not null",
"actual_value": "aws_security_group[{{negative3}}] description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/remote_desktop_port_open/test/negative.tf",
"similarity_id": "f25c2a2ae6ea0b4f2cb887b2f33f69ce1569f7b00a0522c8c8d667a4ded0cca8",
"line": 7,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}] description is defined and not null",
"actual_value": "aws_security_group[{{negative2}}] description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "478294c875a639c111f30cc1a334adb94d041dd954eb079c60032546b49e6a82",
"line": 6,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}] description is defined and not null",
"actual_value": "aws_security_group[{{negative2}}] description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/negative2.tf",
"similarity_id": "908a0c7610f98be7cbcb4b91fe44df06b11c2a83b199a56ba1399d8fbead49cd",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative2}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative2}}] description is defined and not null",
"actual_value": "aws_security_group[{{negative2}}] description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/security_group_without_description/test/positive1.tf",
"similarity_id": "2c0c6e0149f1762c8cf78222421d2f2b8326c3426b28db7f88d03032570e5735",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{allow_tls}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{allow_tls}}] description is defined and not null",
"actual_value": "aws_security_group[{{allow_tls}}] description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/unrestricted_security_group_ingress/test/positive3.tf",
"similarity_id": "220fd79273145fe5498f8f7f17e043b9442d52572d2c254f4a210fb1bc6bd824",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{positive3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{positive3}}] description is defined and not null",
"actual_value": "aws_security_group[{{positive3}}] description is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/http_port_open/test/negative.tf",
"similarity_id": "ba762cc45131836f9b5f790de302e30c86fae6eaecc9519ca2ee8eb58041bc68",
"line": 15,
"issue_type": "MissingAttribute",
"search_key": "aws_security_group[{{negative3}}]",
"search_line": 0,
"search_value": "",
"expected_value": "aws_security_group[{{negative3}}] description is defined and not null",
"actual_value": "aws_security_group[{{negative3}}] description is undefined or null"
}
]
},
{
"query_name": "Variable Without Description",
"query_id": "2a153952-2544-4687-bcc9-cc8fea814a9b",
"query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "All variables should contain a valid description.",
"description_id": "b44986be",
"files": [
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/negative1.tf",
"similarity_id": "62078456419f5622852ab8cf84462b2c74b43b06744b5a34c25e80b23ad3d702",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{cluster_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "41f26963a12df7c1151d97bf1b5d0709e431c561c906b7167901c764ae171689",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "variable.{{private_key_path}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "e381b53ef16b9c328c196929a5a26d4cdbd82d2977ea71dc4d596d2f74f98993",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "variable.{{region}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "0a7073b99329a57cb649f1c21da1367d170f02d41ac2e6e5f807d0109d2f6d6c",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "variable.{{aws_secret_key}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/positive1.tf",
"similarity_id": "fa3f91cba9cd74a984e00c25bc2ac49ea65a279447c29c89176fdc4a3a035b78",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{cluster_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/negative.tf",
"similarity_id": "48d16e18162d19cf802b6e0c2aef11f2d50246dd9fdd7787b771ed385a8da0a9",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{cluster_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "c76818170cf4777255865bde01f29c4e33cd086469dbbd4d02b45e68afc24c09",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{aws_access_key}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "f6232ed43785f9d741f5a0671caef48ec4a173afe1c72e0ac5b581b8ed97343e",
"line": 4,
"issue_type": "MissingAttribute",
"search_key": "variable.{{key_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_log_disabled/test/negative1.tf",
"similarity_id": "1308d0e221e62b1e083f26fdfe97a407ee9dd096edc25877020b7cf9cdae2248",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{cluster_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive2.tf",
"similarity_id": "df50786a61ae71ad217393ae9d4606050a29c48a30c9eaf8e958a0ca8021c4c7",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{cluster_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/missing_cluster_log_types/test/positive.tf",
"similarity_id": "3ef461b9af906c94d782dfb45daf8edb1d5007e815eb6b42ab5a9190a5ec4b42",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{cluster_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/eks_cluster_encryption_disabled/test/positive1.tf",
"similarity_id": "022f0f34de59966151af271df69219e424a7f374245ee40c7c75aa2f6e8a4384",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{cluster_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'description' is defined and not null",
"actual_value": "'description' is undefined or null"
}
]
},
{
"query_name": "Variable Without Type",
"query_id": "fc5109bf-01fd-49fb-8bde-4492b543c34a",
"query_url": "https://www.terraform.io/docs/language/values/variables.html#input-variable-documentation",
"severity": "INFO",
"platform": "Terraform",
"category": "Best Practices",
"description": "All variables should contain a valid type.",
"description_id": "bba696eb",
"files": [
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "19c801966dd2da16397ad711be930605bd6b1a1be3b41f0993e8d883934ad502",
"line": 2,
"issue_type": "MissingAttribute",
"search_key": "variable.{{aws_secret_key}}",
"search_line": 0,
"search_value": "",
"expected_value": "'type' is defined and not null",
"actual_value": "'type' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "6684e95bc8f93fd55f4d3a5c4890655b3bb5591bc18227c940930beb7637d06e",
"line": 5,
"issue_type": "MissingAttribute",
"search_key": "variable.{{region}}",
"search_line": 0,
"search_value": "",
"expected_value": "'type' is defined and not null",
"actual_value": "'type' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "f08f903d32e8d577c959094b07d53f57730ad1af1a848156b65ac30025508d7f",
"line": 4,
"issue_type": "MissingAttribute",
"search_key": "variable.{{key_name}}",
"search_line": 0,
"search_value": "",
"expected_value": "'type' is defined and not null",
"actual_value": "'type' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "2a6e2d88043d99605c846cb8c13e1c90470d7b25e81fa49db30c7316cf3a47ed",
"line": 1,
"issue_type": "MissingAttribute",
"search_key": "variable.{{aws_access_key}}",
"search_line": 0,
"search_value": "",
"expected_value": "'type' is defined and not null",
"actual_value": "'type' is undefined or null"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive2.tf",
"similarity_id": "e340e3072f2ef20a185b495b9e412f688cd60f72a7b78867f42c2e525f335e23",
"line": 3,
"issue_type": "MissingAttribute",
"search_key": "variable.{{private_key_path}}",
"search_line": 0,
"search_value": "",
"expected_value": "'type' is defined and not null",
"actual_value": "'type' is undefined or null"
}
]
}
],
"bill_of_materials": [
{
"query_name": "BOM - S3 Buckets",
"query_id": "2d16c3fb-35ba-4ec0-b4e4-06ee3cbd4045",
"query_url": "https://kics.io",
"severity": "TRACE",
"platform": "Terraform",
"category": "Bill Of Materials",
"description": "A list of S3 resources specified",
"description_id": "0bdf2341",
"files": [
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/negative1.tf",
"similarity_id": "3cfe47bb5e3c6349b98542d91ee5274ed5996f4a13a9e471b073f5ce1582d99d",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my_tf_test_bucket\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive3.tf",
"similarity_id": "20b34fd0c662cb32feced3769c55bd76e0525536aee17c586a2ff36859817714",
"line": 2,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":false}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/positive1.tf",
"similarity_id": "e84fdc991f347648effc622245b9ca4ef7a8db1d439f913cd3c2311ceadfa007",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/negative.tf",
"similarity_id": "aaac2e1ac7eae46819429dfac5e755cf0ad4dac75d51e3b412df9cd3ecdd801f",
"line": 10,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[b2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative2.tf",
"similarity_id": "225b5a3547c7224092d4e7dccb8b044bb8349dd52359285a8b3743dc7d33957f",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[b2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"Bool\\\": {\\n \\\"aws:SecureTransport\\\": \\\"false\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/negative1.tf",
"similarity_id": "ace6a40b375fbd216848326213cb26a261effae0af44a71a13a951710ff4abd5",
"line": 5,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[public-bucket2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-32\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive2.tf",
"similarity_id": "fa667690d97015898c61ace4b7f7384e1014c124b7a9f58898ec55244e0b2f6e",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read-write\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive2.tf",
"similarity_id": "e3fabada99372aa90bdbaa4ec222083b804ddfd18ac6bce27ce80dc566ca84c8",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[b2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my-tf-test-bucket\",\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Id\\\": \\\"MYBUCKETPOLICY\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"IPAllow\\\",\\n \\\"Effect\\\": \\\"Deny\\\",\\n \\\"Principal\\\": \\\"*\\\",\\n \\\"Action\\\": \\\"s3:*\\\",\\n \\\"Resource\\\": [\\n \\\"aws_s3_bucket.b.arn\\\"\\n ],\\n \\\"Condition\\\": {\\n \\\"IpAddress\\\": {\\n \\\"aws:SourceIp\\\": \\\"8.8.8.8/32\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive4.tf",
"similarity_id": "b208adf02709122124fcaf5c0a9531965c66fa008cdc2d83ba09af2b4dcec1d5",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_public_policy/test/negative1.tf",
"similarity_id": "5613eecc821464ca8934d3c2c8fe0c84ef382bbbdc83ef78d96e853511b641dc",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/positive1.tf",
"similarity_id": "06d00bcf29f3f63e83fee5d9971e5d244306c97fbdbcf82b9cd43c13223e08a4",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[b]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my-tf-test-bucket\"}"
},
{
"file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/negative1.tf",
"similarity_id": "bb28259b6d8d780647c6fe0d93b3682ab79c869e1ec23275c0564bf222e80f4d",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[hoge]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"hoge\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/negative1.tf",
"similarity_id": "a0269cda7a646c8aaba0dbb4b7f88e5347027d8a4c4deb514d83fa9b85e71774",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/positive1.tf",
"similarity_id": "e5a588d03ed11119b0afcb00362423fb68d1623a82723ee51747d426bbca6988",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/positive1.tf",
"similarity_id": "f466e21861d0d5f6bce99223e7d54d0e7a2ff556c78ce30b38abf5e598fc4419",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_all_actions_from_all_principals/test/negative1.tf",
"similarity_id": "5d021c75ef09a3e9e8103c6c6f98a9ac83ebf924e843ac79342e221540cce2fa",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my_tf_test_bucket\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/positive1.tf",
"similarity_id": "91d6fe9be8dca86488c76245854106ce1f9124849e3ae8dc59b391bfadc3a582",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:*\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive1.tf",
"similarity_id": "705d28ba4cf90b667145415031ab834a69916db85ede5128933e11d6f7c599cf",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive1.tf",
"similarity_id": "ecbd8d8be3c3aa0925bb400f55a414ee85e50d8206125a585fb859b6b7399403",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive3.tf",
"similarity_id": "36a6df64dff9bdbe2b749f8ab445bc51774b63e36e47af8fc66fdf7e00c2f5d1",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/negative1.tf",
"similarity_id": "fd23b519d9de3c9e937d36c6c15ed6b2d30857d14504942ff8594acd02238a74",
"line": 2,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\"}"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/negative.tf",
"similarity_id": "8aa92d328b0c2510f739b1ea6307d0f1e4cf7ac9260d8b5c2311b74fb824153f",
"line": 69,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/negative1.tf",
"similarity_id": "184e8a008eeceb0d552201392fec564a5f78683cc4baae6ad1b2c3a3b9b63cd9",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my_tf_test_bucket\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/negative1.tf",
"similarity_id": "f4441d44c8dce3d033bc61abad849e84e0a20fff1a0200445cadc9a70d6ee1a2",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive4.tf",
"similarity_id": "671b661eec245970e807af4391c3ebbb8541d19388b8fb499ce71ff70c3df226",
"line": 2,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive3]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/negative1.tf",
"similarity_id": "930988ac27e4f1682a2299c1e8675787b24e3572ce516a4e41ae65f647a8ea14",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}"
},
{
"file_name": "assets/queries/terraform/aws/athena_database_not_encrypted/test/positive1.tf",
"similarity_id": "96b65d7ec60d5487931d8a786e663b5ebdfdf1b909a60dd9be4984892fae3a79",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[hoge]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"hoge\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/negative1.tf",
"similarity_id": "1a0ab5ee1405fb6fbf510f27412091d4abc0e7ef3f045c03e883a80ba69abe0a",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"cors_rule\":{\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000}}"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/negative.tf",
"similarity_id": "1bfbe33817f5456a6025a9d3b83fff5ad8001dece3b05b58f59d0d9f3209f064",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/positive1.tf",
"similarity_id": "d724252e60d639385ecaa09935add198de4965fd23e3ba8dc842bcde1bcf3af7",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf",
"similarity_id": "9ef1ca02e068fd6e648c12ff0ef580b3ffcfc6dd8029f4f3f90be64da3a8e855",
"line": 16,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[foo2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"${aws_s3_bucket.log_bucket.id}\",\"target_prefix\":\"log/\"}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/positive1.tf",
"similarity_id": "439cdfaeaedcf60ccb07cfc151f55de34864a6fd9017faac60039058b67210b5",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[examplebucket]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive2.tf",
"similarity_id": "c3ad79e29a0d7155321fc3d0f9047b7f34ad844eb26b14e62f07e75230d1ebd2",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"some-key\",\"sse_algorithm\":\"AES256\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_public_acl/test/negative1.tf",
"similarity_id": "d9ded88fa570d9a95bb6addc41877ba64def60b05b7ed2782f03b96b5531b695",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_ignore_public_acl/test/negative1.tf",
"similarity_id": "dccd9ebfcd719742700a961317fde677cebcc3a50c0b2f7bfbe5dbe24f05ed7f",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_public_acl_overridden_by_public_access_block/test/positive1.tf",
"similarity_id": "1f6f4c688f980a8b94aa9ee3fcc1611c87d25a564fe9fbec7396f2fe9378d027",
"line": 5,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[public-bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read-write\",\"bucket\":\"bucket-with-public-acl-3\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/positive2.tf",
"similarity_id": "f4cb214e402e7f6a4f7ddfef2574ab338a3e9325928d82eb65b922101520fea3",
"line": 2,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive1.tf",
"similarity_id": "8ca0b7b2a315fa9c1b6b28f38213fd72ec27c8c29e14ae2390f7be30bce0888c",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/positive1.tf",
"similarity_id": "feb3a1e708d932c7e9e508e91410f12018c53eba1a3d0a73bc7ff64f98a16603",
"line": 19,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_not_integrated_with_cloudwatch/test/positive.tf",
"similarity_id": "6da57ecf0ef32da4afbbe03be3c29560a7ab8d3201aaad13258ee1dcf3dc6fab",
"line": 10,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive4]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_get_action_from_all_principals/test/positive1.tf",
"similarity_id": "70a2a1a20a3ef61e2c52d44a9f51f6852f0f97636e5b977342dac5af1af9c5c1",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my_tf_test_bucket\"}"
},
{
"file_name": "assets/queries/terraform/aws/vulnerable_default_ssl_certificate/test/positive.tf",
"similarity_id": "7d38380efc922c9e2a2138848f3227358107e15b153acc4ae67f45b926ed1082",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive2.tf",
"similarity_id": "03ef4eeb44cc99c658039cd3a974e8ca5ef27302e7e9ab8f58f4a73ce8998a0d",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"GET\",\"PUT\",\"POST\",\"DELETE\",\"HEAD\"],\"allowed_origins\":[\"*\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_static_website_host_enabled/test/positive1.tf",
"similarity_id": "81ae4518a54b75efd3cb1199be55b7afa3201173f3ab119a53b8976e3af7c79a",
"line": 2,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read\",\"bucket\":\"s3-website-test.hashicorp.com\",\"website\":{\"error_document\":\"error.html\",\"index_document\":\"index.html\"}}"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/negative1.tf",
"similarity_id": "67a97d3821c1fb10e749d6538a7eeb690825a3d79350caeddbe531e56416c0b9",
"line": 10,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[log_bucket]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"log-delivery-write\",\"bucket\":\"my-tf-log-bucket\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_policy_accepts_http_requests/test/negative1.tf",
"similarity_id": "6604099d7d3c93c84624b67926d65094d828398b9d5e4327cfb842a50a411e49",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[b]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my-tf-test-bucket\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_level_cloudtrail_logging_disabled/test/negative.tf",
"similarity_id": "e511aa399e157dd721d42b9d3249def9a50cd140337857f25fbe0df00d64522b",
"line": 20,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[foo3]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current3.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_to_any_authenticated_user/test/positive1.tf",
"similarity_id": "198cbc0ccc999475689626fcb64a6544d288966f5bcdfc7983ed4d41a1081138",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"authenticated-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_is_publicly_accessible/test/positive1.tf",
"similarity_id": "95bfc44a4337badf496c97f0bf8648e21203e4020878a018648ee2ee71ff9424",
"line": 10,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[b]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_object_not_encrypted/test/negative1.tf",
"similarity_id": "ad415d657ef54484a27a9f197fed0dfe922f5d57dfa3347107c896ba28354b0b",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[examplebucket]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"examplebuckettftest\",\"object_lock_configuration\":{\"object_lock_enabled\":\"Enabled\"},\"versioning\":{\"enabled\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_acl_allows_read_or_write_to_all_users/test/positive1.tf",
"similarity_id": "4284ee3c815ea34a164c9d1d1bd41c23f86401c80c0dd3671a0dc5aece1ce4eb",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_unsecured_cors_rule/test/positive1.tf",
"similarity_id": "ea34f358f6e9d96683cfd53c5785ca7c6b5c3cf85c75d3574788bafe0bed6abb",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"public-read\",\"bucket\":\"my-tf-test-bucket\",\"cors_rule\":{\"allowed_headers\":[\"*\"],\"allowed_methods\":[\"PUT\",\"POST\"],\"allowed_origins\":[\"https://s3-website-test.hashicorp.com\"],\"expose_headers\":[\"ETag\"],\"max_age_seconds\":3000},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":false}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/positive2.tf",
"similarity_id": "b49586a525c02b6b1e996a8dba4269c7eeadfb794ac7df7dd8e0bd10ae7456b8",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive2]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"}}"
},
{
"file_name": "assets/queries/terraform/aws/cloudtrail_log_files_s3_bucket_with_logging_disabled/test/positive1.tf",
"similarity_id": "52a4ead57d40049da3b0f60cf9f8c992a47f0cadd75bf761005121133a01979a",
"line": 10,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[foo]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"tf-test-trail\",\"force_destroy\":true,\"policy\":\"{\\n \\\"Version\\\": \\\"2012-10-17\\\",\\n \\\"Statement\\\": [\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailAclCheck\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:GetBucketAcl\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail\\\"\\n },\\n {\\n \\\"Sid\\\": \\\"AWSCloudTrailWrite\\\",\\n \\\"Effect\\\": \\\"Allow\\\",\\n \\\"Principal\\\": {\\n \\\"Service\\\": \\\"cloudtrail.amazonaws.com\\\"\\n },\\n \\\"Action\\\": \\\"s3:PutObject\\\",\\n \\\"Resource\\\": \\\"arn:aws:s3:::tf-test-trail/prefix/AWSLogs/${data.aws_caller_identity.current.account_id}/*\\\",\\n \\\"Condition\\\": {\\n \\\"StringEquals\\\": {\\n \\\"s3:x-amz-acl\\\": \\\"bucket-owner-full-control\\\"\\n }\\n }\\n }\\n ]\\n}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_allows_writeacp_action_from_all_principals/test/positive1.tf",
"similarity_id": "c7953fb7aa44cc79fd055c52cc70ae98ed42c2a4f4bab036a614061ad00bbfc6",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"my_tf_test_bucket\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_enabled_mfa_delete/test/negative.tf",
"similarity_id": "dee2e88009ac8e34ef3d5f02bb802ecc43558d74ffdd71f83f41ab656a906301",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true,\"mfa_delete\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_versioning/test/negative1.tf",
"similarity_id": "f5aef5e494ab7efdbecb94e4c7e2dbe6ad95f06addd2ffffcc01a47e2e24c1c2",
"line": 2,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"enabled\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/positive3.tf",
"similarity_id": "ae3ded1985cb283bf170c1553793a5815577ad55acd8be6768c9f1e406f3ac7d",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_with_all_permissions/test/negative1.tf",
"similarity_id": "caff2c6eef0e43d2e2a2f609284d4a965372bfd162398996b3dfe3f1677229dc",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"S3B_181355\",\"policy\":\"\\t{\\n\\t \\\"Id\\\": \\\"id113\\\",\\n\\t \\\"Version\\\": \\\"2012-10-17\\\",\\n\\t \\\"Statement\\\": [\\n\\t\\t{\\n\\t\\t \\\"Action\\\": [\\n\\t\\t\\t\\\"s3:putObject\\\"\\n\\t\\t ],\\n\\t\\t \\\"Effect\\\": \\\"Allow\\\",\\n\\t\\t \\\"Resource\\\": \\\"arn:aws:s3:::S3B_181355/*\\\",\\n\\t\\t \\\"Principal\\\": \\\"*\\\"\\n\\t\\t}\\n\\t ]\\n\\t}\\n\"}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_sse_disabled/test/negative1.tf",
"similarity_id": "9430b62718b0a7f9273c57285497bf4c6230b960dbcee3ee1735d54d5ff25140",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"server_side_encryption_configuration\":{\"rule\":{\"apply_server_side_encryption_by_default\":{\"kms_master_key_id\":\"${aws_kms_key.mykey.arn}\",\"sse_algorithm\":\"aws:kms\"}}},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_logging_disabled/test/negative1.tf",
"similarity_id": "7c0a7ad742cf3016ba7ac1deace3421835f5a1d6230cbc5d4aae22702026985f",
"line": 2,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[negative1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"acl\":\"private\",\"bucket\":\"my-tf-test-bucket\",\"logging\":{\"target_bucket\":\"logs\"},\"tags\":{\"Environment\":\"Dev\",\"Name\":\"My bucket\"},\"versioning\":{\"mfa_delete\":true}}"
},
{
"file_name": "assets/queries/terraform/aws/s3_bucket_without_restriction_of_public_bucket/test/positive1.tf",
"similarity_id": "76144ef296c0cc5b8505090d561fff1e126e10d71f2c7a6b21932eddd70f5bb5",
"line": 1,
"issue_type": "BillOfMaterials",
"search_key": "aws_s3_bucket[positive1]",
"search_line": 0,
"search_value": "",
"expected_value": "",
"actual_value": "",
"value": "{\"bucket\":\"example\"}"
}
]
}
]
}