A static analysis security scanner for Terraform code that identifies misconfigurations across major cloud providers.
tfsec is a static analysis security scanner specifically designed for Terraform infrastructure as code. It analyzes Terraform configurations to identify potential security misconfigurations and compliance violations before deployment to cloud environments. The tool helps prevent security breaches by catching issues early in the development cycle.
DevOps engineers, infrastructure developers, and security teams working with Terraform to manage cloud infrastructure across AWS, Azure, GCP, Kubernetes, and other platforms.
Developers choose tfsec for its deep Terraform-specific analysis capabilities, comprehensive multi-cloud coverage, and seamless integration into CI/CD pipelines. It provides fast, accurate security feedback directly in the development workflow.
Tfsec is now part of Trivy
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Evaluates HCL expressions, Terraform functions, and resource relationships, not just literal values, reducing false positives.
Includes hundreds of built-in rules for AWS, Azure, GCP, Kubernetes, and minor providers, covering most cloud deployments.
Capable of quickly scanning huge repositories, making it efficient for CI/CD pipelines with large codebases.
Supports inline comments with expiration dates for ignoring warnings, aiding in managed technical debt and compliance.
The project is being phased out in favor of Trivy, meaning future updates, new checks, and engineering focus will shift away from tfsec.
Only scans Terraform code, not other IaC languages or general application security, restricting its use in mixed environments.
For Terraform <0.12, only v0.1.3 of tfsec is available with fewer checks and reduced functionality, hindering legacy projects.