Skip to content

Conversation

akshseh
Copy link
Member

@akshseh akshseh commented Aug 21, 2025

Amazon Bedrock AgentCore Samples Pull Request

Instructions

  • Do not erase any parts of this template that are not applicable to your pull request.
  • If a section is not applicable, explicitly state the reason.
    • Tick the checkboxes for the items you have completed.
  • These are mandatory requirements, not mere suggestions.

Describe your changes

  • Concise description of the PR
Changes to ..., because ...

Issue ticket number and link

  • Issue # (if applicable)

All Submissions:

  • Have you followed the guidelines in our Contributing document?
  • Have you checked to ensure there aren't other open Pull Requests for the same update/change?
  • Are you uploading a dataset?
  • Have you added contributions to RELEASE NOTES?

New Example Submissions:

  • Have you tested your code, and made sure the functionality runs successfully? Provide screenshots.
  • Have you linted your Python code with black?
  • Have you documented Introduction, Architecture Diagram, Prerequisites, Usage, Sample Prompts, and Clean Up steps in your example README?
  • I agree to resolve any issues created for this example in the future.

Copy link

Check out this pull request on  ReviewNB

See visual diffs & provide feedback on Jupyter Notebooks.


Powered by ReviewNB

@EashanKaushik EashanKaushik added 01-tutorials 01-tutorials 04-AgentCore-memory 01-tutorials/04-AgentCore-memory labels Aug 25, 2025
@github-actions github-actions bot added the 07-AgentCore-E2E 01-tutorials/07-AgentCore-E2E label Sep 12, 2025
Copy link

github-actions bot commented Sep 12, 2025

Latest scan for commit: 703d067 | Updated: 2025-10-06 19:37:13 UTC

Security Scan Results

Scan Metadata

  • Project: ASH
  • Scan executed: 2025-10-06T19:37:01+00:00
  • ASH version: 3.0.0

Summary

Scanner Results

The table below shows findings by scanner, with status based on severity thresholds and dependencies:

Column Explanations:

Severity Levels (S/C/H/M/L/I):

  • Suppressed (S): Security findings that have been explicitly suppressed/ignored and don't affect the scanner's pass/fail status
  • Critical (C): The most severe security vulnerabilities requiring immediate remediation (e.g., SQL injection, remote code execution)
  • High (H): Serious security vulnerabilities that should be addressed promptly (e.g., authentication bypasses, privilege escalation)
  • Medium (M): Moderate security risks that should be addressed in normal development cycles (e.g., weak encryption, input validation issues)
  • Low (L): Minor security concerns with limited impact (e.g., information disclosure, weak recommendations)
  • Info (I): Informational findings for awareness with minimal security risk (e.g., code quality suggestions, best practice recommendations)

Other Columns:

  • Time: Duration taken by each scanner to complete its analysis
  • Action: Total number of actionable findings at or above the configured severity threshold that require attention

Scanner Results:

  • PASSED: Scanner found no security issues at or above the configured severity threshold - code is clean for this scanner
  • FAILED: Scanner found security vulnerabilities at or above the threshold that require attention and remediation
  • MISSING: Scanner could not run because required dependencies/tools are not installed or available
  • SKIPPED: Scanner was intentionally disabled or excluded from this scan
  • ERROR: Scanner encountered an execution error and could not complete successfully

Severity Thresholds (Thresh Column):

  • CRITICAL: Only Critical severity findings cause scanner to fail
  • HIGH: High and Critical severity findings cause scanner to fail
  • MEDIUM (MED): Medium, High, and Critical severity findings cause scanner to fail
  • LOW: Low, Medium, High, and Critical severity findings cause scanner to fail
  • ALL: Any finding of any severity level causes scanner to fail

Threshold Source: Values in parentheses indicate where the threshold is configured:

  • (g) = global: Set in the global_settings section of ASH configuration
  • (c) = config: Set in the individual scanner configuration section
  • (s) = scanner: Default threshold built into the scanner itself

Statistics calculation:

  • All statistics are calculated from the final aggregated SARIF report
  • Suppressed findings are counted separately and do not contribute to actionable findings
  • Scanner status is determined by comparing actionable findings to the threshold
Scanner S C H M L I Time Action Result Thresh
bandit 0 0 0 0 0 0 602ms 0 PASSED MED (g)
cdk-nag 0 0 0 0 0 0 26.7s 0 PASSED MED (g)
cfn-nag 0 0 0 0 0 0 5ms 0 PASSED MED (g)
checkov 0 0 0 0 0 0 4.6s 0 PASSED MED (g)
detect-secrets 0 0 0 0 0 0 600ms 0 PASSED MED (g)
grype 0 0 0 0 0 0 <1ms 0 ERROR MED (g)
npm-audit 0 0 0 0 0 0 176ms 0 PASSED MED (g)
opengrep 0 0 0 0 0 0 <1ms 0 SKIPPED MED (g)
semgrep 0 0 0 0 0 0 13.3s 0 PASSED MED (g)
syft 0 0 0 0 0 0 2.1s 0 PASSED MED (g)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

01-tutorials 01-tutorials 04-AgentCore-memory 01-tutorials/04-AgentCore-memory 07-AgentCore-E2E 01-tutorials/07-AgentCore-E2E

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants