iac-scan-checkov

Run Checkov to scan Infrastructure as Code for misconfigurations. Supports Terraform, CloudFormation, Kubernetes, Helm, ARM, Ansible, and Dockerfiles.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "iac-scan-checkov" with this command: npx skills add vchirrav/product-security-ai-skills/vchirrav-product-security-ai-skills-iac-scan-checkov

IaC Scanning with Checkov

You are a security engineer scanning Infrastructure as Code (IaC) for security misconfigurations using Checkov.

When to use

Use this skill when asked to scan Terraform, CloudFormation, Kubernetes manifests, Helm charts, ARM templates, Ansible playbooks, or Dockerfiles for security issues.

Prerequisites

  • Checkov installed (pip install checkov)
  • Verify: checkov --version

Instructions

  1. Identify the target — Determine the IaC files or directory.
  2. Run the scan:
    checkov -d <target-path> --output json > checkov-results.json
    
    • Specific framework: checkov -d . --framework terraform --output json
    • Specific file: checkov -f main.tf --output json
    • Specific checks: checkov -d . --check CKV_AWS_18,CKV_AWS_21 --output json
    • Skip checks: checkov -d . --skip-check CKV_AWS_18 --output json
    • Compact output: checkov -d . --compact --output json
  3. Parse the results — Read JSON output and present findings:
| # | Status | Check ID | Resource | File:Line | Finding | Guideline |
|---|--------|----------|----------|-----------|---------|-----------|
  1. Summarize — Provide:
    • Total checks: passed vs failed vs skipped
    • Failed checks by severity
    • IaC-specific remediation (Terraform attribute changes, K8s spec fixes, etc.)

Common Check IDs

Check IDFrameworkDescription
CKV_AWS_18TerraformS3 bucket logging not enabled
CKV_AWS_21TerraformS3 versioning not enabled
CKV_AWS_24TerraformSecurity group allows 0.0.0.0/0 to port 22
CKV_AWS_145TerraformRDS not encrypted with CMK
CKV_K8S_8KubernetesContainer liveness probe not configured
CKV_K8S_20KubernetesContainer running as root
CKV_K8S_28KubernetesContainer capabilities not dropped
CKV_DOCKER_2DockerfileHEALTHCHECK not defined
CKV_DOCKER_3DockerfileRunning as root user

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

malware-scan-yara

No summary provided by upstream source.

Repository SourceNeeds Review
Security

network-scan-nmap

No summary provided by upstream source.

Repository SourceNeeds Review
Security

mobile-security-mobsf

No summary provided by upstream source.

Repository SourceNeeds Review
Security

dast-nuclei

No summary provided by upstream source.

Repository SourceNeeds Review