Skip to content

Conversation

@jossaiaws
Copy link

Amazon Bedrock AgentCore Samples Pull Request

Important

  1. We strictly follow a issue-first approach, please first open an issue relating to this Pull Request.
  2. Once this Pull Request is ready for review please attach review ready label to it. Only PRs with review ready will be reviewed.

Issue number:

Concise description of the PR

Changes to ..., because ...

User experience

Please share what the user experience looks like before and after this change

Checklist

If your change doesn't seem to apply, please leave them unchecked.

  • I have reviewed the contributing guidelines
  • Add your name to CONTRIBUTORS.md
  • Have you checked to ensure there aren't other open Pull Requests for the same update/change?
  • Are you uploading a dataset?
  • Have you documented Introduction, Architecture Diagram, Prerequisites, Usage, Sample Prompts, and Clean Up steps in your example README?
  • I agree to resolve any issues created for this example in the future.
  • I have performed a self-review of this change
  • Changes have been tested
  • Changes are documented

Acknowledgment

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of the project license.

@github-actions github-actions bot added 02-use-cases 02-use-cases local-prototype-to-agentcore 02-use-cases/local-prototype-to-agentcore labels Oct 9, 2025
cleanup
@github-actions
Copy link

Latest scan for commit: 2708d24 | Updated: 2025-10-22 17:05:17 UTC

Security Scan Results

})

logger.info(f"✓ API Key Credential Provider created successfully")
logger.info(f" Provider ARN: {api_key_provider['credentialProviderArn']}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.

logger.info(f"✓ API Key Credential Provider created successfully")
logger.info(f" Provider ARN: {api_key_provider['credentialProviderArn']}")
logger.info(f" Provider Name: {api_key_provider['name']}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
api_key_provider_arn = f"arn:aws:bedrock-agentcore:{aws_region}:{get_account_id()}:credential-provider/InsuranceAPIKeyProvider"

logger.info(f"✓ Using existing API Key Credential Provider")
logger.info(f" Provider Name: {api_key_provider_name}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
"""

logger.info("Add the following to your .env file:")
logger.info(env_additions)

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.
logger.info("\nPhase 1 (Outbound Identity):")
logger.info(f" ✓ OAuth2 configuration documented (using Cognito)")
if api_key_provider_name:
logger.info(f" ✓ API Key Provider created: {api_key_provider_name}")

Check failure

Code scanning / CodeQL

Clear-text logging of sensitive information High

This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.
This expression logs
sensitive data (password)
as clear text.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

02-use-cases 02-use-cases local-prototype-to-agentcore 02-use-cases/local-prototype-to-agentcore

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant