-
Notifications
You must be signed in to change notification settings - Fork 734
Aqua CloudSploit Plugin Assessment #271
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Aqua CloudSploit Plugin Assessment
matthewdfuller
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good overall, but one small fix
| if (sg.IpPermissions.length || | ||
| sg.IpPermissionsEgress.length) { | ||
| helpers.addResult(results, 2, | ||
| sg.GroupName + 'security group has ' + (sg.IpPermissions.length || '0') + ' inbound and ' + (sg.IpPermissionsEgress.length || '0') + ' outbound rules', | ||
| region, resource); | ||
| } else { | ||
| helpers.addResult(results, 0, | ||
| 'Default security group does not have inbound or outbound rules', | ||
| region, resource); | ||
| } |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a good additional check, but for now we just want to flag the group, regardless of whether it has any rules or not. Can you modify this section to remove the extra if/else check?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Okay, will remove this additional check.
Removed if/else condition to check length of rules.
|
Thanks for submitting @iamasimforever - closing this now that we are moving forward with other plugins. |
Aqua CloudSploit Plugin Assessment: EC2 LaunchWizard Security Groups.