Checkov, a static code analysis tool designed to prevent cloud misconfigurations, is experiencing significant activity with numerous issues related to false positives and feature requests for enhanced functionality. The project, maintained by Prisma Cloud, supports multiple IaC frameworks like Terraform and Kubernetes.
Recent activities highlight a surge in issues concerning discrepancies in check behaviors, particularly with Terraform modules and dynamic blocks. There is a strong demand for updates to accommodate changes in cloud provider APIs and Terraform syntax, as well as requests for custom checks reflecting organizational policies. This indicates a growing need for tailored security compliance measures.
Recent issues such as #6717 and #6709 reveal ongoing challenges with maintaining compatibility with evolving cloud services. The issues collectively suggest that while the project is actively addressing user concerns, there is a persistent need for updates to existing checks to align with changes in cloud provider APIs and Terraform syntax.
Taylor (tsmithv11) - 13 commits
Rabea Zreik (RabeaZr) - 22 commits
Anton Grübel (gruebel) - 16 commits
Inbal Avital (inbalavital) - 6 commits
Steve Vaknin (SteveVaknin) - 4 commits
The team shows a strong focus on security-related features, particularly around secrets management and compliance checks, indicating an agile approach to software development.
Timespan | Opened | Closed | Comments | Labeled | Milestones |
---|---|---|---|---|---|
7 Days | 5 | 1 | 6 | 0 | 1 |
30 Days | 23 | 5 | 27 | 0 | 1 |
90 Days | 65 | 54 | 101 | 2 | 1 |
1 Year | 323 | 193 | 789 | 12 | 3 |
All Time | 1798 | 1639 | - | - | - |
Like all software activity quantification, these numbers are imperfect but sometimes useful. Comments, Labels, and Milestones refer to those issues opened in the timespan in question.
Developer | Avatar | Branches | PRs | Commits | Files | Changes |
---|---|---|---|---|---|---|
Taylor | ![]() |
1 | 4/5/0 | 13 | 44 | 26533 |
Rabea Zreik | ![]() |
1 | 10/11/0 | 22 | 3 | 341 |
inbalavital | ![]() |
1 | 3/3/0 | 6 | 11 | 323 |
omriyoffe-panw | ![]() |
1 | 1/1/0 | 3 | 7 | 208 |
Max Amelchenko | ![]() |
1 | 4/4/0 | 7 | 27 | 190 |
Anton Grübel | ![]() |
1 | 0/0/0 | 16 | 1 | 158 |
Damien Trouillet | ![]() |
1 | 0/1/0 | 2 | 8 | 77 |
Steve Vaknin | ![]() |
1 | 2/2/0 | 4 | 7 | 63 |
pazbec | ![]() |
1 | 0/1/0 | 2 | 4 | 60 |
Emma | ![]() |
1 | 1/1/0 | 1 | 8 | 35 |
Omry Mendelovich | ![]() |
1 | 2/2/0 | 4 | 4 | 27 |
dependabot[bot] | ![]() |
4 | 5/2/3 | 5 | 5 | 24 |
LirShindalman | ![]() |
1 | 1/1/0 | 2 | 4 | 23 |
Mike Urbanski (mikeurbanski1) | 1 | 1/0/0 | 2 | 1 | 17 | |
AdamDev | ![]() |
1 | 1/1/0 | 2 | 3 | 13 |
ChanochShayner | ![]() |
1 | 1/1/0 | 2 | 3 | 9 |
BhEaN (bhean) | 0 | 1/0/0 | 0 | 0 | 0 | |
None (jbrule) | 0 | 2/0/0 | 0 | 0 | 0 | |
Adrian Grucza (apgrucza) | 0 | 1/0/0 | 0 | 0 | 0 | |
Craig Andrews (candrews) | 0 | 1/0/0 | 0 | 0 | 0 | |
simon-rb (simon-rb) | 0 | 1/0/0 | 0 | 0 | 0 | |
Ikko Eltociear Ashimine (eltociear) | 0 | 1/0/0 | 0 | 0 | 0 | |
Quentin Delettre (qdelettre) | 0 | 1/0/0 | 0 | 0 | 0 | |
None (shakedunay) | 0 | 2/0/2 | 0 | 0 | 0 | |
Iheanacho Chukwu (iheanacho-chukwu) | 0 | 1/0/0 | 0 | 0 | 0 |
PRs: created by that dev and opened/merged/closed-unmerged during the period
The GitHub repository for Checkov has seen significant activity, with 159 open issues as of now. The recent issues highlight a range of concerns, including false positives in checks, feature requests for enhanced functionality, and discussions around the integration of new cloud provider features. Notably, several issues point to discrepancies between expected and actual behavior of checks, particularly regarding the handling of modules and dynamic blocks in Terraform configurations.
A recurring theme in the recent issues is the need for updates to existing checks to accommodate changes in cloud provider APIs or Terraform syntax, such as the removal of certain parameters in AzureRM 4.x or the introduction of new resource types. Additionally, there are multiple requests for custom checks that reflect organizational policies or best practices, indicating a growing desire for tailored security compliance measures.
Here are some of the most recently created and updated issues:
Issue #6717: List of dangerous roles for CKV_GCP_44 seems to be out of date
Issue #6711: Support GitLab's !reference tags
Issue #6709: False positive for provider check during terraform plan scans
Issue #6700: Check: CKV_AWS_45 false-positive on Lambda environment variables
Issue #6693: Terraform provisioner checks
Issue #6689: Update CKV_GCP_79 to check for Postgres 16
Issue #6678: Checkov Linter fails to recognize comments in JSON after MegaLinter update
Issue #6673: Bug report on --prisma-api-url
being ignored
These issues reflect ongoing challenges with maintaining compatibility with evolving cloud services and user expectations for security compliance.
This analysis underscores the importance of continuous updates and community involvement in maintaining the relevance and effectiveness of security tools like Checkov.
The provided dataset contains a comprehensive list of pull requests (PRs) for the Checkov project, which is focused on static code analysis for cloud infrastructure as code. The dataset includes both open and closed PRs, with a variety of changes ranging from feature additions to bug fixes and dependency updates.
PR #6719: docs: update README.md
PR #6718: feat(azure): Implementing .checkovignore
file
.checkovignore
file, enhancing usability and flexibility.PR #6703: fix(terraform): Added ssl_mode attribute support
ssl_mode
attribute in Google Cloud SQL, addressing deprecation issues and ensuring compliance with Terraform's latest standards.PR #6702: chore: Upgrade to Python 3.12
PR #6699: chore(deps): bump github/codeql-action
PR #6695: chore(terraform): update CKV_GCP_79 gcp postgres version to 16
PR #6687: fix(terraform): Security group attached to DocumentDB cluster
PR #6663: fix(terraform): CKV_GCP_32 Add other common enabling values
PR #6659: feat: Added OSS Bucket Encryption Check for Alibaba Cloud
PR #6647: feat: add support for awscc provider secrets check
PR #6634: chore(deps): bump stefanzweifel/changelog-updater-action
PR #6633: chore(deps): bump actions/checkout from 4.1.1 to 4.1.7
PR #6622: feat(general): Allow skipping multiple checks in a single line
PR #6070: feat(kubernetes): add kubernetes labels as entity_tags
PR #6045: chore: Allow dependency rustworkx 0.14.x
rustworkx
, improving compatibility with modern environments.The pull requests reflect several key themes:
Enhancements and New Features:
Many PRs focus on adding new features or enhancing existing functionality, such as the introduction of the .checkovignore
file (#6718) and support for AWSCC provider checks (#6647). This indicates an active effort to improve user experience and adapt to evolving cloud technologies.
Dependency Management and Upgrades: A significant number of PRs involve upgrading dependencies (e.g., Python version upgrades in PR #6702 and various GitHub Actions). This is crucial for maintaining compatibility with external libraries and tools while also leveraging improvements made by those dependencies.
Security Improvements: Several PRs address security concerns directly, such as ensuring that sensitive configurations are enforced (e.g., CKV_AZURE_244 regarding AKS max surge settings). This aligns with Checkov's mission of preventing misconfigurations and vulnerabilities in cloud infrastructure.
Documentation and Usability Enhancements: There are multiple instances where documentation is updated or improved (e.g., PR #6719 correcting README typos). This emphasizes the importance placed on clear communication with users regarding tool usage and best practices.
While there is significant activity in terms of open pull requests, there seems to be a lack of recent merges compared to the number of contributions being made. This could lead to contributor frustration if their work does not get integrated promptly into the main branch.
Several older PRs remain unresolved or have been closed without action (e.g., PRs over 90 days old), which may indicate issues with project management or prioritization within the development team.
In conclusion, while Checkov demonstrates robust community engagement and ongoing development efforts through its pull requests, there are opportunities for improvement in merge responsiveness and addressing contributor concerns effectively.
Taylor (tsmithv11)
Chanoch Shayner
Anton Grübel (gruebel)
Emma Vinen
Damien Trouillet (dtrouillet)
Rabea Zreik (RabeaZr)
Steve Vaknin (SteveVaknin)
Max Amelchenko (maxamel)
Omry Mendelovich (omryMen)
AdamDev
Omri Yoffe (omriyoffe-panw)
Paz Bechor (pazbechor)
Lir Shindalman (lirshindalman)
Inbal Avital (inbalavital)
Dependabot[bot]