From 2fe767e3e500af46fe2dc9c45a3acf797edb5e95 Mon Sep 17 00:00:00 2001 From: Pepe Fagoaga Date: Tue, 25 Jul 2023 18:26:22 +0200 Subject: [PATCH] fix(ecs_task_def_secrets): Improve description to explain findings (#2621) --- .../ecs_task_definitions_no_environment_secrets.metadata.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json index 6bc544f1..db7a3d0b 100644 --- a/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json +++ b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json @@ -12,7 +12,7 @@ "ResourceIdTemplate": "arn:partition:service:region:account-id:resource-id", "Severity": "critical", "ResourceType": "AwsEcsTaskDefinition", - "Description": "Check if secrets exists in ECS task definitions environment variables", + "Description": "Check if secrets exists in ECS task definitions environment variables. If a secret is detected, the line number shown in the finding matches with the environment variable \"Name\" attribute starting to count at the \"environment\" key from the ECS Task Definition in JSON format.", "Risk": "The use of a hard-coded password increases the possibility of password guessing. If hard-coded passwords are used; it is possible that malicious users gain access through the account in question.", "RelatedUrl": "", "Remediation": {