You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Maybe a separate issue, but we should in general be flagging whenever a sensitive value is assigned to a non-sensitive slot or vice versa. For example, the following template raises no diagnostics but should raise two:
@secure()
paramsecretstringparamnonSensitivestringresourcee'Microsoft.CostManagement/exports@2024-08-01' = {
name: secret// <-- Should flag assignment of sensitive data to non-sensitive slotproperties: {
definition: {
timeframe: 'BillingMonthToDate'type: 'Usage'
}
deliveryInfo: {
destination: {
container: 'containerName'sasToken: nonSensitive// <-- Should flag assignment of non-sensitive data to sensitive slot
}
}
}
}
We should be able to do this based on existing type validation flags. I'm not sure if we accurately track "taint," though (i.e., is a variable whose value is based on a secure parameter itself be flagged as secure?).
The following scenarios should be blocked:
Scenario 1:
main.bicep
:Scenario 2:
main.bicepparam
:main.bicep
:The text was updated successfully, but these errors were encountered: