-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add description as additional column in Rego validation results #69
Conversation
Signed-off-by: Santosh <ksantosh@intelops.dev>
Signed-off-by: Santosh <ksantosh@intelops.dev>
Hi there 👋, @DryRunSecurity here, below is a summary of our analysis and findings.
Note 🟢 Risk threshold not exceeded. Change Summary (click to expand)The following is a summary of changes in this pull request made by me, your security buddy 🤖. Summary: This pull request includes a series of changes across multiple files, primarily focused on improving the security and reliability of the "genval" CLI tool and its associated Rego policies. The changes cover various aspects, such as version information retrieval, policy evaluation result printing, Rego policy implementation, and Kubernetes deployment validation. From a security perspective, the changes do not introduce any obvious security vulnerabilities. The code modifications are mostly focused on improving code organization, readability, and the enforcement of security best practices. The removal of unused imports, the enhancement of error handling, and the compilation of Rego policies are all positive steps towards maintaining a secure application. The most notable security-related changes include the enforcement of secure Dockerfile practices, such as the use of trusted base images, the avoidance of the root user, and the preference for the "COPY" instruction over "ADD". Additionally, the Kubernetes deployment validation policies aim to prevent the use of the "latest" tag, the storage of secrets in environment variables, and the use of privileged pods, which are all important security considerations. Overall, the changes in this pull request demonstrate a proactive approach to improving the security posture of the application, and the application security engineer should continue to monitor the codebase and the implemented Rego policies to ensure the ongoing security and integrity of the system. Files Changed:
Powered by DryRun Security |
Move the results evaluation and printing logic to a saperate func and add description column in results for all the regoval sub commands. Update version command to print text logo and version Signed-off-by: Santosh <ksantosh@intelops.dev>
This PR adds a column named
Description
in validation results forregoval
.Currently, as the policies live outside the executable and are provided by the user. It gets complex to infer against the policy content. Hence, The
msg
value in the policy is fetched and printed on the validation results.This addition aims to provide users with clearer insights into the validation outcomes by presenting relevant policy messages directly within the results.
Validation results for Dockerfile

Validation results for Kubernetes manifests

Validation results for Terraform

Closes: #26