Skip to content

Suggest forking the repo before use #9

@JDiPierro

Description

@JDiPierro

Including an externally-controlled terraform module as part of your infrastructure feels like a huge security concern. If a malicious actor somehow got write access to this repository they could add an instance to the module with their own SSH key and some startup script to report to a control server, then next time someone updates their infrastructure the hacker would have direct access to a host inside your network.

Instead of recommending people use the module with:

module "dynamodb_autoscaler" {
  source = "git::https://github.com/cloudposse/terraform-aws-dynamodb-autoscaler.git?ref=master"
  ...
}

IMO it'd be better to suggest something like:

  • Fork the repo into your own namespace and use that git URL
  • Copy the module source directly into your repo
  • Add this repository as a submodule of your own (Least secure but still more secure as you have to manually update it)

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions