fix(query): fix EFS Volume With Disabled Transit Encryption queries for multiple volumes cases #7947
+1,124
−61
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.








Reason for Proposed Changes
aws_ecs_task_definitionresource, causing all volumes to generate identical similarityIDs. Without volume indexing in the searchKey and searchLine, KICS silently deduplicated vulnerability reports, leaving security issues in additional volumes undetected.resource.volumeinstead ofresource.volume[vol_idx]), causing all volumes to generate identical searchKeys and searchLines;eval_conflict_errorand preventing the query from executing;Proposed Changes
resource.volumetoresource.volume[vol_idx]to capture array indicesis_array()checks to handle both:"volume": {...};"volume": [{...}, {...}];get_volumes(): Normalizes both structures, returning volume objects with indices;get_search_key(): Builds unique searchKeys including volume index when present;get_search_line(): Inserts volume index into searchLine path for proper identification;is_transit_encryption_disabled()that caused eval_conflict_error;I submit this contribution under the Apache-2.0 license.