Skip to content

Remove sensitive data from README #174

Remove sensitive data from README

Remove sensitive data from README #174

Triggered via push December 3, 2025 14:38
Status Success
Total duration 55s
Artifacts
Run KICS scan
51s
Run KICS scan
Fit to window
Zoom out
Zoom in

Annotations

11 warnings
Run KICS scan
CodeQL Action v3 will be deprecated in December 2026. Please update all occurrences of the CodeQL Action in your workflow files to v4. For more information, see https://github.blog/changelog/2025-10-28-upcoming-deprecation-of-codeql-action-v3/
[MEDIUM] AKS RBAC Disabled: terraform/azure/aks.tf#L23
Azure Container Service (AKS) instance should have role-based access control (RBAC) enabled
[MEDIUM] AKS Private Cluster Disabled: terraform/azure/aks.tf#L1
Azure Kubernetes Service (AKS) API should not be exposed to the internet
[MEDIUM] AD Admin Not Configured For SQL Server: terraform/azure/sql.tf#L9
The Active Directory Administrator is not configured for a SQL server
[HIGH] RDP Is Exposed To The Internet: terraform/azure/networking.tf#L64
Port 3389 (Remote Desktop) is exposed to the internet
[HIGH] Passwords And Secrets - Generic Password: terraform/azure/sql.tf#L41
Query to find passwords and secrets in infrastructure code.
[HIGH] Passwords And Secrets - Generic Password: terraform/azure/sql.tf#L64
Query to find passwords and secrets in infrastructure code.
[HIGH] Passwords And Secrets - Generic Password: terraform/azure/instance.tf#L36
Query to find passwords and secrets in infrastructure code.
[HIGH] Passwords And Secrets - Generic Password: terraform/azure/sql.tf#L15
Query to find passwords and secrets in infrastructure code.
[HIGH] Passwords And Secrets - Generic Password: terraform/azure/instance.tf#L11
Query to find passwords and secrets in infrastructure code.
[HIGH] MySQL Server Public Access Enabled: terraform/azure/sql.tf#L50
MySQL Server public access should be disabled