Security Feedback on Every PR
Every time you push Terraform, Bicep, or Terragrunt changes, Cloudgeni reviews them automatically. Security issues get flagged with inline comments and suggested fixes—right on the PR.Automatic
Triggers on every PR. No manual scans needed.
Inline Comments
Feedback on exact lines with code suggestions.
Severity Ratings
Critical → Low so you know what to fix first.
Block Merges
Optional: require passing review to merge.
How It Works
What You See
Summary Comment
Inline Comments
🔴 Critical: S3 Bucket Public AccessFile: modules/storage/main.tf (line 15)The
acl = "public-read" makes this bucket publicly readable. This could expose sensitive data.Suggested Fix:What Gets Checked
- Security
- Compliance
- Best Practices
- Custom
- Public access enabled
- Missing encryption
- Weak IAM policies
- Open security groups
- Hardcoded secrets
Severity Levels
| Level | What It Means | Action |
|---|---|---|
| 🔴 Critical | Immediate security risk | Must fix before merge |
| 🟠 High | Significant concern | Should fix before merge |
| 🟡 Medium | Moderate risk | Consider fixing |
| 🔵 Low | Minor issue | Fix when convenient |
| ⚪ Info | FYI | No action needed |
Supported Providers
GitHub
Native GitHub App with PR comments
GitLab
OAuth integration for merge requests
Azure DevOps
PR thread comments
Block Insecure Merges
Add Cloudgeni as a required status check:- GitHub
- GitLab
- Azure DevOps
- Settings → Branches → Edit protection rule
- Enable Require status checks to pass
- Add
cloudgeni/security-review
Configuration
What to Review
| Setting | Effect |
|---|---|
| All | Everything including Info |
| Low+ | Skip Info |
| Medium+ | Only Medium, High, Critical |
| High+ | Only High and Critical |
| Critical | Only Critical |
Where to Review
- All repos (default)
- Specific repos (include/exclude list)
- Specific branches (main only, etc.)
Handle False Positives
Mark in Dashboard
Mark in Dashboard
- Find the finding in Cloudgeni
- Click Mark as False Positive
- Add a reason
- Won’t appear in future reviews
Inline Suppression
Inline Suppression
Add a comment in your code:
Org-Wide Rules
Org-Wide Rules
Create suppression rules by:
- Check ID
- Resource type
- File path pattern
Troubleshooting
| Problem | Fix |
|---|---|
| Reviews not appearing | Check webhook delivery in Git provider settings |
| Delayed reviews | Large PRs take longer. Check status page. |
| Permission errors | Re-authorize Cloudgeni app in Git provider |
| Missing inline comments | Some findings show as general comment if line not in diff |