Add claude-agent-sdk patterns to Terraform#58
Conversation
|
Latest scan for commit: Security Scan ResultsScan Metadata
SummaryScanner ResultsThe table below shows findings by scanner, with status based on severity thresholds and dependencies: Column Explanations: Severity Levels (S/C/H/M/L/I):
Other Columns:
Scanner Results:
Severity Thresholds (Thresh Column):
Threshold Source: Values in parentheses indicate where the threshold is configured:
Statistics calculation:
Detailed FindingsShow 19 actionable findingsFinding 1: CKV2_AWS_5
Description: Code Snippet: Finding 2: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 3: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 4: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 5: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 6: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 7: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 8: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 9: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 10: terraform.aws.security.aws-ecr-mutable-image-tags.aws-ecr-mutable-image-tags
Description: Code Snippet: Finding 11: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 12: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 13: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 14: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 15: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 16: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 17: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 18: javascript.lang.security.audit.path-traversal.path-join-resolve-traversal.path-join-resolve-traversal
Description: Code Snippet: Finding 19: terraform.aws.security.aws-ecr-mutable-image-tags.aws-ecr-mutable-image-tags
Description: Code Snippet: Report generated by Automated Security Helper (ASH) at 2026-03-12T14:20:43+00:00 |
|
Can we also add the equivalent input validation and conditional environment variable from this diff? |
…E_USE_BEDROCK env var - Add precondition to prevent zip deployment with claude-agent-sdk patterns - Add conditional CLAUDE_CODE_USE_BEDROCK=1 environment variable - Add is_claude_agent_sdk local flag Mirrors CDK backend-stack.ts changes from PR #45.
Rename the default agent name from StrandsAgent to FASTAgent since the template is framework-agnostic and supports multiple patterns. Updated in: - infra-cdk/lib/backend-stack.ts (CfnParameter default) - infra-terraform/modules/backend/locals.tf - infra-terraform/README.md Note: the CDK change is slightly out of scope for this Terraform-focused PR but included here to keep the two infra tools in sync.
Change *.py to **/*.py so files in subdirectories (code_int_mcp/, agents/, tools/) are included in the Docker image content hash. Without this, edits to those files wouldn't trigger a rebuild.
| is_zip = var.backend_deployment_type == "zip" | ||
|
|
||
| # Pattern flags | ||
| is_claude_agent_sdk = contains(["claude-agent-sdk-single-agent", "claude-agent-sdk-multi-agent"], var.backend_pattern) |
| [filesha256("${local.pattern_dir}/Dockerfile")], | ||
| [filesha256("${local.pattern_dir}/requirements.txt")], | ||
| [for f in fileset(local.pattern_dir, "*.py") : filesha256("${local.pattern_dir}/${f}")], | ||
| [for f in fileset(local.pattern_dir, "**/*.py") : filesha256("${local.pattern_dir}/${f}")], |
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.