A static code analysis tool that scans infrastructure as code, container images, and open source packages for security misconfigurations and vulnerabilities.
Checkov is an open-source static analysis tool that scans Infrastructure as Code (IaC) templates, container images, and open-source packages for security misconfigurations and vulnerabilities. It helps developers and DevOps teams identify risks in cloud resources and dependencies during the build phase, preventing insecure configurations from reaching production.
Cloud engineers, DevOps teams, security professionals, and platform engineers who manage infrastructure using Terraform, Kubernetes, CloudFormation, or similar IaC tools and need to enforce security and compliance policies.
Checkov provides a unified, extensible scanner for multiple IaC frameworks and SCA, with a large built-in policy library and graph-based analysis for accurate detection. It integrates seamlessly into CI/CD pipelines and offers both CLI and API-driven workflows.
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Scans over a dozen IaC frameworks including Terraform, CloudFormation, Kubernetes, and Dockerfile, making it versatile for multi-cloud environments as per the multi-framework scanning feature.
Uses in-memory graph scanning to detect complex misconfigurations across resources, improving accuracy over simple pattern matching, which is highlighted in the context-aware policies.
Includes over 1000 built-in policies covering AWS, Azure, and Google Cloud best practices, reducing the initial setup for common security checks.
Identifies hardcoded secrets using regex patterns, keywords, and entropy analysis, helping prevent credential leaks in infrastructure code, as detailed in the secrets detection feature.
Requires Prisma Cloud API for remediation guides and some advanced features, which can introduce vendor lock-in and internet dependency, as noted in the disclaimer about skipping downloads.
Limited to Python 3.9-3.12, which may conflict with existing environments or necessitate virtual environments, as specified in the installation requirements.
Handling false positives requires in-code annotations or CLI flags, which can become tedious in large projects without centralized configuration, as shown in the suppression examples.