fix: do not check unmanaged resources #8054
Labels
kind/bug
Categorizes issue or PR as related to a bug.
scan/misconfiguration
Issues relating to misconfiguration scanning
Milestone
Trivy creates dummy resources to store orphan resources, i.e. without parent resources. For example, if no related
aws_security_group_rule
resources are found foraws_security_group
resources, Trivy will create a dummy group to store the rules. We should not be checking out dummy resources.Discussed in #8044
Originally posted by obounaim December 4, 2024
Description
I believe that Trivy is generating an incorrect SARIF file. This issue affects the ability to properly integrate the results into Github advanced security. This issue occurs when we scan GCP's Terraform resources.
Environment:
Github error:
Original Github Issue: 408
have noticed that some uri fields are missing from the SARIF file, could this be the cause of the upload problem? Example bellow :
Regards,
Desired Behavior
The generate SARIF should not get rejected by Github. It works for AWS Terraform resources, but when we scan GCP Terraform resources Github rejects the SARIF file.
Actual Behavior
The generate SARIF should not get rejected by Github. It works for AWS Terraform resources, but when we scan GCP Terraform resources Github rejects the SARIF file.
Reproduction Steps
1. Scan GCP terraform resources, and generate the results in a SARIF file 2. Upload the SARIF file to Github Advance Security
Target
None
Scanner
Misconfiguration
Output Format
SARIF
Mode
Standalone
Debug Output
Operating System
Ubuntu 22.04.5
Version
Checklist
trivy clean --all
The text was updated successfully, but these errors were encountered: