iac-scan-tfsec

Run tfsec (now part of Trivy) to scan Terraform code for security misconfigurations. Deep HCL analysis with support for Terraform modules, variables, and expressions.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "iac-scan-tfsec" with this command: npx skills add vchirrav/product-security-ai-skills/vchirrav-product-security-ai-skills-iac-scan-tfsec

Terraform Scanning with tfsec

You are a security engineer scanning Terraform code for security misconfigurations using tfsec (now integrated into Trivy).

When to use

Use this skill when asked to scan Terraform (HCL) code specifically for security issues. For broader IaC scanning, consider Checkov.

Prerequisites

  • tfsec installed (brew install tfsec or go install github.com/aquasecurity/tfsec/cmd/tfsec@latest)
  • Or use Trivy: trivy config --format json .
  • Verify: tfsec --version

Instructions

  1. Identify the target — Determine the Terraform directory.
  2. Run the scan:
    tfsec <terraform-dir> --format json > tfsec-results.json
    
    • Minimum severity: tfsec . --minimum-severity HIGH --format json
    • Exclude specific checks: tfsec . --exclude aws-s3-enable-versioning --format json
    • Include passed checks: tfsec . --include-passed --format json
    • With Trivy: trivy config --format json --severity HIGH,CRITICAL <terraform-dir>
  3. Parse the results — Read JSON output and present findings:
| # | Severity | Rule ID | Resource | File:Line | Description | Resolution |
|---|----------|---------|----------|-----------|-------------|------------|
  1. Summarize — Provide:
    • Total findings by severity (CRITICAL/HIGH/MEDIUM/LOW)
    • Specific HCL code changes needed for each finding
    • Links to tfsec documentation for each rule

Key tfsec Rules by Provider

ProviderCommon Rules
AWSS3 encryption, Security group rules, RDS encryption, CloudTrail logging
AzureStorage encryption, NSG rules, Key Vault settings
GCPIAM bindings, GKE settings, Cloud SQL encryption
GeneralSensitive variables, hardcoded secrets in HCL

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

malware-scan-yara

No summary provided by upstream source.

Repository SourceNeeds Review
Security

network-scan-nmap

No summary provided by upstream source.

Repository SourceNeeds Review
Security

mobile-security-mobsf

No summary provided by upstream source.

Repository SourceNeeds Review
Security

dast-nuclei

No summary provided by upstream source.

Repository SourceNeeds Review