An open API service providing repository metadata for many open source software ecosystems.

GitHub / terraform-aws-modules / terraform-aws-ec2-instance

Terraform module to create AWS EC2 instance(s) resources 🇺🇦

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/terraform-aws-modules%2Fterraform-aws-ec2-instance
PURL: pkg:github/terraform-aws-modules/terraform-aws-ec2-instance

Stars: 792
Forks: 1,956
Open issues: 2

License: apache-2.0
Language: HCL
Size: 294 KB
Dependencies parsed at: Pending

Created at: about 8 years ago
Updated at: 29 days ago
Pushed at: 29 days ago
Last synced at: 29 days ago

Commit Stats

Commits: 168
Authors: 43
Mean commits per author: 3.91
Development Distribution Score: 0.601
More commit stats: https://commits.ecosyste.ms/hosts/GitHub/repositories/terraform-aws-modules/terraform-aws-ec2-instance

Topics: aws, aws-ec2, ec2-instance, terraform-module

Funding Links https://github.com/sponsors/antonbabenko, https://www.paypal.me/antonbabenko

OpenSSF Scorecard report

5.9

Overall Score

10/10 Critical Risk
34/50 High Risk
9/40 Medium Risk
10/20 Low Risk
Generated on August 04, 2025 | Scorecard vv5.2.1-28-gc1d103a9
Security Checks
10/10
Binary-Artifacts
High Risk

no binaries found in the repo

Determines if the project has generated executable (binary) artifacts in the source repository.

10/10
Dangerous-Workflow
Critical Risk

no dangerous workflow patterns detected

Determines if the project's GitHub Action workflows avoid dangerous patterns.

10/10
License
Low Risk

license file detected

Determines if the project has defined a license.

Show details
ℹ️ Info: project has a license file: LICENSE:0
ℹ️ Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0
10/10
Maintained
High Risk

6 commit(s) and 22 issue activity found in the last 90 days -- score normalized to 10

Determines if the project is "actively maintained".

10/10
Vulnerabilities
High Risk

0 existing vulnerabilities detected

Determines if the project has open, known unfixed vulnerabilities.

9/10
Security-Policy
Medium Risk

security policy file detected

Determines if the project has published a security policy.

Show details
ℹ️ Info: security policy file detected: github.com/terraform-aws-modules/.github/SECURITY.md:1
ℹ️ Info: Found linked content: github.com/terraform-aws-modules/.github/SECURITY.md:1
⚠️ Warn: One or no descriptive hints of disclosure, vulnerability, and/or timelines in security policy
ℹ️ Info: Found text in security policy: github.com/terraform-aws-modules/.github/SECURITY.md:1
4/10
Code-Review
High Risk

Found 14/30 approved changesets -- score normalized to 4

Determines if the project requires human code review before pull requests (aka merge requests) are merged.

0/10
CII-Best-Practices
Low Risk

no effort to earn an OpenSSF best practices badge detected

Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.

0/10
Fuzzing
Medium Risk

project is not fuzzed

Determines if the project uses fuzzing.

Show details
⚠️ Warn: no fuzzer integrations found
0/10
Pinned-Dependencies
Medium Risk

dependency not pinned by hash detected -- score normalized to 0

Determines if the project has declared and pinned the dependencies of its build process.

Show details
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/lock.yml:11: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/lock.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pr-title.yml:17: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pr-title.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:44: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:48: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:55: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:64: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:84: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:91: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/pre-commit.yml:94: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/pre-commit.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:23: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/release.yml/master?enable=pin
⚠️ Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/release.yml/master?enable=pin
⚠️ Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/stale-actions.yaml:10: update your workflow using https://app.stepsecurity.io/secureworkflow/terraform-aws-modules/terraform-aws-ec2-instance/stale-actions.yaml/master?enable=pin
ℹ️ Info: 0 out of 5 GitHub-owned GitHubAction dependencies pinned
ℹ️ Info: 0 out of 9 third-party GitHubAction dependencies pinned
0/10
SAST
Medium Risk

SAST tool is not run on all commits -- score normalized to 0

Determines if the project uses static code analysis.

Show details
⚠️ Warn: 0 commits out of 16 are checked with a SAST tool
0/10
Token-Permissions
High Risk

detected GitHub workflow tokens with excessive permissions

Determines if the project's workflows follow the principle of least privilege.

Show details
⚠️ Warn: no topLevel permission defined: .github/workflows/lock.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/pr-title.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/pre-commit.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/release.yml:1
⚠️ Warn: no topLevel permission defined: .github/workflows/stale-actions.yaml:1
ℹ️ Info: no jobLevel write permissions found
N/A
Branch-Protection
Not Applicable

internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration

Determines if the default and release branches are protected with GitHub's branch protection settings.

N/A
Packaging
Not Applicable

packaging workflow not detected

Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.

Show details
⚠️ Warn: no GitHub/GitLab publishing workflow detected.
N/A
Signed-Releases
Not Applicable

no releases found

Determines if the project cryptographically signs release artifacts.