Skip to content

Conversation

@Peter-Gess
Copy link
Owner

No description provided.

@wiz-d533c10adf
Copy link

wiz-d533c10adf bot commented Jun 2, 2025

Wiz Scan Summary

Scanner Findings
Vulnerability Finding Vulnerabilities
Data Finding Sensitive Data
Secret Finding Secrets 1 High
IaC Misconfiguration IaC Misconfigurations
Total 1 High

View scan details in Wiz

To detect these findings earlier in the dev lifecycle, try using Wiz Code VS Code Extension.

provider "aws" {
region = "us-east-2"
access_key = "AKIAJSIE37KKMHXI3BJQ"
secret_key = "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"
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

High Secret Finding

Cloud Key

More Details
Attribute Value
SHA256 276b4010576305d3d6b9505d3eecd60d3ec109ae7abb49766d54c967ac110299
Key Type AWS Secret Access Key
Long Term Expiry Yes
Provider ID AKIAJSIE37KKMHXI3BJQ

Rule ID: SECRET-SYSTEM-1


To ignore this finding as an exception, reply to this conversation with #wiz_ignore reason

If you'd like to ignore this finding in all future scans, add an exception in the .wiz file (learn more) or create an Ignore Rule (learn more).

@Peter-Gess Peter-Gess closed this Jun 2, 2025
@Peter-Gess Peter-Gess deleted the Peter-Gess-patch-1 branch June 2, 2025 12:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants