Akshat Tandon
Akshat Tandon
**Is your feature request related to a problem? Please describe.** Tirith policies are hard-coded and do not support parameterization. Simple variation require the whole policy to written again. **Describe the...
**Is your feature request related to a problem? Please describe.** There is no way to track what is upcoming on Tirith. **Describe the solution you'd like** Create a public project...
Create a new `operation_type` for determining relationship between terraform resources. For example: checking if `aws_instance` terraform resource has an `aws_security_group` resource defined and attached to it.
If a Tirith policy looks like below, warn the user that `check_ingress_to_port` is not accounted when evaluating `eval_expression`. ``` { "meta": { "required_provider": "stackguardian/terraform_plan", "version": "v1" }, "evaluators": [ {...
Exit Tirith with the following codes depending on these outcomes: 0 - successful evaluation and policy passes 1 - error encountered during the tirith run 2 - successful evaluation and...