From 30fe129f405690fe7edde3d34ceb9741c87ee374 Mon Sep 17 00:00:00 2001 From: cx-henriqueAlvelos Date: Fri, 30 Jun 2023 11:23:22 +0100 Subject: [PATCH 1/2] changed descriptionURLs --- .../aws/lambda_permission_principal_is_wildcard/metadata.json | 2 +- .../terraform/aws/missing_cluster_log_types/metadata.json | 2 +- .../aws/unrestricted_security_group_ingress/metadata.json | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/assets/queries/terraform/aws/lambda_permission_principal_is_wildcard/metadata.json b/assets/queries/terraform/aws/lambda_permission_principal_is_wildcard/metadata.json index 15adde55f2d..d5d54beab68 100644 --- a/assets/queries/terraform/aws/lambda_permission_principal_is_wildcard/metadata.json +++ b/assets/queries/terraform/aws/lambda_permission_principal_is_wildcard/metadata.json @@ -4,7 +4,7 @@ "severity": "MEDIUM", "category": "Access Control", "descriptionText": "Lambda Permission Principal should not contain a wildcard.", - "descriptionUrl": "https://docs.ansible.com/ansible/latest/collections/community/aws/lambda_policy_module.html", + "descriptionUrl": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission", "platform": "Terraform", "descriptionID": "b443babe", "cloudProvider": "aws" diff --git a/assets/queries/terraform/aws/missing_cluster_log_types/metadata.json b/assets/queries/terraform/aws/missing_cluster_log_types/metadata.json index f92bb0f949e..efc288818a3 100755 --- a/assets/queries/terraform/aws/missing_cluster_log_types/metadata.json +++ b/assets/queries/terraform/aws/missing_cluster_log_types/metadata.json @@ -4,7 +4,7 @@ "severity": "LOW", "category": "Observability", "descriptionText": "Amazon EKS control plane logging don't enabled for all log types", - "descriptionUrl": "https://www.terraform.io/docs/providers/aws/r/eks_cluster.html", + "descriptionUrl": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/eks_cluster.html", "platform": "Terraform", "descriptionID": "e89d4ffb", "cloudProvider": "aws" diff --git a/assets/queries/terraform/aws/unrestricted_security_group_ingress/metadata.json b/assets/queries/terraform/aws/unrestricted_security_group_ingress/metadata.json index b933f8e3dcd..545041fa9c5 100644 --- a/assets/queries/terraform/aws/unrestricted_security_group_ingress/metadata.json +++ b/assets/queries/terraform/aws/unrestricted_security_group_ingress/metadata.json @@ -4,7 +4,7 @@ "severity": "HIGH", "category": "Networking and Firewall", "descriptionText": "Security groups allow ingress from 0.0.0.0:0 and/or ::/0", - "descriptionUrl": "https://www.terraform.io/docs/providers/aws/r/security_group.html", + "descriptionUrl": "https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/security_group.html", "platform": "Terraform", "descriptionID": "ce3ee5e0", "cloudProvider": "aws" From 29f42e0a10185bf258c25caf76a90bdc754581d5 Mon Sep 17 00:00:00 2001 From: gabriel-cx Date: Tue, 23 Jan 2024 12:45:46 +0000 Subject: [PATCH 2/2] update docs --- docs/running-kics.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/running-kics.md b/docs/running-kics.md index 1acc2a6f19e..2d668fd7807 100644 --- a/docs/running-kics.md +++ b/docs/running-kics.md @@ -33,7 +33,7 @@ Available archive formats: - `xz` ``` -docker run -t -v {path_to_scan_zip}:/path checkmarx/kics scan -p /path +docker run -t -v {path_to_zip}:/path checkmarx/kics scan -p /path/{name_of_zip_file} ``` More information can be seen [here](https://github.com/hashicorp/go-getter#unarchiving)