Open
Conversation
This GitHub agentic workflow daily scan through terraform repo and generate issue report about critical vulnerabilities, security advise and cost optimization recommendation. I have tried this in my personal GitHub repo and here is the link for reference ranglanimanish90/newinfra#52
Contributor
|
It looks like you've incorrectly branched from the You can attempt to fix this with a rebase: If that does not resolve it, you can run |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR adds a comprehensive Terraform Security & Best Practices Workflow that performs automated security scanning and cost optimization analysis for cloud infrastructure defined in Terraform code. The workflow supports multi-cloud environments with detailed coverage for both AWS and Azure.
Organizations using Terraform to manage cloud infrastructure need automated ways to:
Detect security vulnerabilities before deployment
Identify compliance issues early in the development cycle
Optimize cloud spending through infrastructure right-sizing
Maintain security and cost best practices across teams
This workflow addresses these needs by providing continuous, automated analysis that creates actionable GitHub Issues with specific recommendations.
I have tried and tested this workflow, last month and here is the example for that.
ranglanimanish90/newinfra#52
Link to my personal blog where i explained about this feature - https://kloudscoop.com/github-agentic-workflows-working-implementation-part1/
Feel free to give your feedback on improvements as applicable.