You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`--stdout-format`| string |`yaml`|`yaml`, `json`, or `sarif` output on stdout. |
252
+
|`--report-path`| string slice || Write findings to one or more files; format is inferred from the extension. |
253
+
|`--ignore-on-exit`| enum |`none`| Control exit codes: `all`, `results`, `errors`, or `none`. |
254
+
|`--max-target-megabytes`| int |`0`| Skip files larger than the threshold (0 disables the check). |
255
+
|`--max-findings`| int |`0`| Caps the total number of results. Scan stops early if limit is reached. Omit or set to 0 to disable. |
256
+
|`--max-rule-matches-per-fragment`| int |`0`| Caps the number of results per rule per fragment (e.g., file, chunked file, page). Omit or set to 0 to disable. |
257
+
|`--validate`| bool |`false`| Enrich results by verifying secrets when supported. |
Copy file name to clipboardExpand all lines: engine/rules/aws.go
+1-17Lines changed: 1 addition & 17 deletions
Original file line number
Diff line number
Diff line change
@@ -10,22 +10,6 @@ func AWS() *config.Rule {
10
10
return&config.Rule{
11
11
RuleID: "aws-access-token",
12
12
Description: "Identified a pattern that may indicate AWS credentials, risking unauthorized cloud resource access and data breaches on AWS platforms.", //nolint:lll
0 commit comments