terragrunt
Audited by Socket on Feb 28, 2026
1 alert found:
SecurityThis document is a Terragrunt/OpenTofu patterns and scaffolding guide, not executable malware. It contains standard IaC patterns: generating provider/backends, fetching modules from Git, scaffolding, and a referenced script to create S3 and DynamoDB resources. Primary risks are operational and supply-chain in nature: (1) fetching and executing remote module code (transitive trust), (2) potential accidental credential exposure when following CI examples or copying placeholders, and (3) the referenced setup-state-backend.sh script is not provided for review and could perform destructive or unsafe operations if malicious or buggy. Recommendations: always pin module and catalog refs, review any remote module code before apply, inspect the setup-state-backend.sh script before running (or run with --dry-run), and ensure CI token handling and generated files are stored and logged safely. Overall there's no clear malicious behavior present in the provided text, but legitimate supply-chain and credential risks exist and should be mitigated.