Replies: 1 comment
-
Hey @rod2a, You can use kics-github-action as part of a GitHub Actions workflow in your repo. This allows you to configure the For reference, you can check how it's used in the KICS repository here: The kics-github-action README provides more details on available input variables, which you can customize to fine-tune your scans. Hope this helps! Let me know if you need further clarification. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello ! I just add a simple aws_cloudwatch_log_metric_filter in my application in order to create a alarm when the "FAILED" pattern is found in my log :
This new ressource generates many new findings about non existing log metric filters and alarms, for example :
The global security of my aws account is managed by another team in another code repo, so I excluded all these findings.
Is this a normal behaviour ? Is there (another) way to avoid all these findings ?
Beta Was this translation helpful? Give feedback.
All reactions