Skip to content

Commit a408bd1

Browse files
committed
docs: rename "Tfsec" references to "Trivy"
1 parent c585fcf commit a408bd1

6 files changed

Lines changed: 12 additions & 12 deletions

File tree

CLAUDE.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,12 +42,12 @@ pnpm lint # Lint and fix with ESLint
4242

4343
### Terraform Infrastructure
4444

45-
**Pre-commit hooks**: Run `pre-commit install` and `pre-commit install --hook-type pre-push` after initial clone. Hooks automatically format Terraform, validate syntax, check security (tfsec), and prevent secret commits.
45+
**Pre-commit hooks**: Run `pre-commit install` and `pre-commit install --hook-type pre-push` after initial clone. Hooks automatically format Terraform, validate syntax, check security (Trivy), and prevent secret commits.
4646

4747
**Prerequisites for deployment**:
4848
- Owned domain name (for SSL certificate)
4949
- AWS credentials configured
50-
- Required tools: Terraform 1.0+, TFLint, tfsec, detect-secrets, terraform-docs
50+
- Required tools: Terraform 1.0+, TFLint, Trivy, detect-secrets, terraform-docs
5151

5252
**Format Terraform before committing**:
5353
```bash

CONTRIBUTING.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Before contributing, ensure you have:
2727
- **AWS Account** with appropriate IAM permissions
2828
- **Terraform** 1.0+ installed
2929
- **Pre-commit** framework installed
30-
- **TFLint**, **tfsec**, **terraform-docs**, **detect-secrets** installed
30+
- **TFLint**, **Trivy**, **terraform-docs**, **detect-secrets** installed
3131
- **Node.js** and **pnpm** for application development
3232
- **kubectl** and **helm** (for EKS contributions)
3333

@@ -225,9 +225,9 @@ chore(deps): upgrade Terraform AWS provider to v5.0
225225

226226
4. **Security scanning**:
227227
```bash
228-
# tfsec should run via pre-commit, but you can run manually:
229-
tfsec infra-ecs/
230-
tfsec infra-eks/
228+
# Trivy should run via pre-commit, but you can run manually:
229+
trivy infra-ecs/
230+
trivy infra-eks/
231231
```
232232

233233
5. **Documentation generation**:

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ Ready to get started? Choose the path that matches your goal:
271271

272272
## Developer Setup: Pre-commit Hooks
273273

274-
This project uses pre-commit hooks to enforce code quality, security, and formatting standards before commits. The hooks automatically format Terraform files, validate syntax, check for security issues, and prevent secret commits.
274+
This project uses pre-commit hooks to enforce code quality, security, and formatting standards before commits and pushes to the remote repository. The hooks automatically format Terraform files, validate syntax, check for security issues, and prevent secret commits.
275275

276276
### Prerequisites
277277

@@ -289,8 +289,8 @@ brew install pre-commit
289289
brew install tflint
290290
tflint --init # Install TFLint AWS plugin
291291

292-
# 3. Install tfsec (security scanner)
293-
brew install tfsec
292+
# 3. Install Trivy (security scanner)
293+
brew install trivy
294294

295295
# 4. Install detect-secrets
296296
brew install detect-secrets

infra-ecs/docs/PREREQUISITES_AND_SETUP.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Ensure you have the following before starting:
1111
- **Terraform 1.0+** installed locally ([Installation Guide](https://developer.hashicorp.com/terraform/downloads))
1212
- **AWS CLI** installed and configured ([Installation Guide](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html))
1313
- **(Optional) GitHub Repository** if you plan to use the included CI/CD workflows
14-
- **(Optional) Pre-commit Tools** for local development: TFLint, tfsec, detect-secrets, terraform-docs
14+
- **(Optional) Pre-commit Tools** for local development: TF validate, TF format, TFLint, Trivy, detect-secrets, terraform-docs
1515

1616
## 2. Required Configuration Changes
1717

infra-ecs/docs/adr/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Each ADR follows this structure:
4040

4141
## Relationship to Security Scanning
4242

43-
These ADRs document **intentional design decisions** that security scanners (Trivy, tfsec) may flag as findings. Each ADR:
43+
These ADRs document **intentional design decisions** that security scanner (Trivy) may flag as findings. Each ADR:
4444

4545
1. Acknowledges the security scanner finding
4646
2. Evaluates alternative approaches

infra-eks/docs/PREREQUISITES_AND_SETUP.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Ensure you have the following before starting:
1313
- **kubectl** installed for Kubernetes cluster management ([Installation Guide](https://kubernetes.io/docs/tasks/tools/))
1414
- **(Optional) Helm CLI** for package management ([Installation Guide](https://helm.sh/docs/intro/install/))
1515
- **(Optional) GitHub Repository** if you plan to use the included CI/CD workflows
16-
- **(Optional) Pre-commit Tools** for local development: TFLint, tfsec, detect-secrets, terraform-docs
16+
- **(Optional) Pre-commit Tools** for local development: TFLint, Trivy, detect-secrets, terraform-docs
1717

1818
## 2. Required Configuration Changes
1919

0 commit comments

Comments
 (0)