assess_iac_changeRun a security review on a Terraform plan, CloudFormation template, or Kubernetes manifest before the agent applies it.
{
"format": "terraform",
"plan": "<terraform plan output>"
}{
"verdict": "blocked",
"findings": [
{
"rule": "public_acl_on_sensitive_bucket",
"severity": "critical",
"resource": "aws_s3_bucket.prod_data_store",
"fix_hint": "Remove ACL; enforce bucket policy + Block Public Access."
}
]
}