This repository is no longer maintained nor does the VS Code extension it encapsulate.
Checkov VS Code extension was rebranded as the Prisma Cloud VS Code plugin and can now be found here
Checkov is a static code analysis tool for infrastructure-as-code, secrets, and software composition analysis.
The Checkov Extension for Visual Studio Code enables developers to get real-time scan results, as well as inline fix suggestions as they develop cloud infrastructure.
The extension is currently available for download directly from the Visual Studio Extension Marketplace and its source code is available in an Apache 2.0 licensed repository. Development of the extension is ongoing and it is available for pre-release usage 🚧 .
Activating the extension requires a Prisma Cloud Access Key and API. It uses Prisma Cloud APIs to evaluate code and offer automated inline fixes. For more information about data shared with Prisma Cloud see the Disclaimer section below).
Extension features include:
- 1000+ built-in policies covering security and compliance best practices for AWS, Azure and Google Cloud.
- Terraform, Terraform Plan, CloudFormation, Kubernetes, Helm, Serverless and ARM template scanning.
- Detects AWS credentials in EC2 Userdata, Lambda environment variables and Terraform providers.
- In Terraform, checks support evaluation of arguments expressed in variables and remote modules to their actual values.
- Supports inline suppression via comments.
- Links to policy descriptions, rationales as well as step by step instructions for fixing known misconfigurations.
- Fix suggestions for commonly misconfigured Terraform and CloudFormation attributes.
Open the Checkov Extension for Visual Studio Code in the Visual Studio Marketplace.
The Checkov extension will invoke the latest version of Checkov
.
-
In Prisma Cloud, go to Settings > Access Control > Add > Access Key and copy the keys.
-
In Visual Studio Code, enter your keys and API endpoint in the Checkov Extension settings page.
-
Using a custom CA certificate is possible. If needed, set the path to the certificate file in the Checkov Extension settings page.
-
If you find the error message noisy, you're able to disable it entirely by selecting
Disable error message
in the Checkov Extension settings page.
- Open a file you wish to scan with checkov in VSCode.
- Open the command palette (⇧⌘P) and run the command
Checkov Scan
. - Scan results should now appear in your editor.
- Click a scan to see its details. Details will include the violating policy and a link to step-by-step fix guidelines.
- In most cases, the Details will include a fix option. This will either add, remove or replace an unwanted configuration, based on the Checkov fix dictionaries.
- You can skip checks by adding an inline skip annotation
checkov:skip=<check_id>:<suppression_comment>
. For more details see the docs. - The extension will continue to scan file modifications and highlight errors in your editor upon every material resource modification.
To access checkov-vscode logs directory, open the VSCODE Command Palette (Ctrl+Shift+P)
or (Command+Shift+P)
, and run the command Open Checkov Log
. It is helpful if you delete the log file and then re-try whichever operation was failing in order to produce clean logs.
If you are getting failures and are running the Checkov extension via Docker, it's possible MacOS needs to give Docker permission to access the directory location of your code.
In MacOS System Preferences > Privacy and Security > Privacy
Find the Files and Folders
section from the list, and ensure Docker
has access to your code location.
Symptoms of this issue can be found in the extension logs, you will see [info]: Running Checkov
with executablePath: docker
and then output showing zero passed, failed, or skipped checks, and 1+ parsing errors, as below:
[info]: Running checkov {“executablePath”:“docker”,“arguments”
...
...
[debug]: Checkov task output:
...
\“passed\“: 0,\r\n \“failed\“: 0,\r\n \“skipped\“: 0,\r\n \“parsing_errors\“: 1,\r\n \“checkov_version\“: \“1.0.770\“\r\n }
Contribution is welcomed!
Start by reviewing the contribution guidelines. After that, take a look at a good first issue.
Looking to contribute new checks? Learn how to write a new check (AKA policy) here.
To use this plugin, you will need a Prisma Cloud account. The plugin uses Prisma Cloud's fixes API to analyse and produce code fixes, and enrich the results provided into the IDE. Please notice the Prisma Cloud privacy policy for more details. To generate fixes, files found to have triggered checkov violations are made available to the fixes API for the sole purpose of generating inline fixes code recommendations.