-
Updated
Jan 6, 2022 - Go
security-automation
Here are 345 public repositories matching this topic...
-
Updated
Jan 5, 2022 - Go
-
Updated
Jan 7, 2022 - Python
-
Updated
Dec 28, 2021 - Python
-
Updated
Jan 7, 2022 - Python
-
Updated
Jul 3, 2021 - C#
-
Updated
Aug 22, 2021 - Python
Description of problem:
The bash remediation of selinux_state runs:
fixfiles onboot
fixfiles -f relabel
whereas the Ansible remediation doe
-
Updated
Oct 13, 2020 - Python
-
Updated
Nov 17, 2021 - Python
Summary
Dependabot has identified several security vulnerabilities in the 3rd party libraries Pacbot relies on. In most cases, these vulnerabilities can be resolved by upgrading the library to the most current version.
Maintainers, if you're internal to T-Mobile, you should have been seeing these security alerts coming in over the last several weeks. *Please respond to these in a timely ma
We have started to include license details in our version identifier configuration here: https://github.com/e-m-b-a/emba/blob/master/config/bin_version_strings.cfg
This is in a very early stage and need your help. If you know the license of some of the software components please include it directly in the configuration and bring up a pull request or comment to this issue with the license and th
-
Updated
Dec 1, 2021 - Python
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
-
Updated
Dec 26, 2021 - Python
-
Updated
Dec 21, 2021 - Shell
-
Updated
Jan 3, 2022 - Python
-
Updated
Jan 6, 2022 - JavaScript
-
Updated
Dec 9, 2017 - Ruby
Right now a lot of the logging from the tasks does not get propagated back to the user, so we should make sure that all of the tasks are adding logs and errors to the results so that at minimum the data gets put into the worker-log.txt. Ideally we would store this info in datastore so that the clients could query it later (this part is in #115).
-
Updated
Jan 6, 2022 - Python
#22 introduced a feature to guess actions that are similar to an existing policy. It currently doesn't support all actions.
Here's things I currently know are missing (comment if you find more):
- KMS:
Encrypt,Decrypt,GenerateDataKey, ... - ECR:
BatchDeleteImage,BatchGetImage, ... -
*Deregister* -
*Modify* -
*Remove* - API Gateway: (
DELETE,
-
Updated
Jan 7, 2022 - Go
-
Updated
Aug 1, 2018 - Python
Feedback
I think that you are doing a very necessary system and your idea is cool, but at the moment it has a lot of bugs. From what I noticed, the assets do not understand the ascii characters and the system crashes. In addition, I did not find a description of the API, I would like to integrate your system into TheHive, or rather make it possible to view information about an asset in TheHive. I believe t
-
Updated
Sep 7, 2018
As a user of the secureCodeBox
I want to access the docs for the auto-discovery on the docs page
to be able to use configure and use it properly
- Include auto-discovery docs on the docs page
- Add a link to the docs page to the menu
Improve this page
Add a description, image, and links to the security-automation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the security-automation topic, visit your repo's landing page and select "manage topics."
Slack us first!
Hello. I write about problem here:
https://owasp.slack.com/archives/C2P5BA8MN/p1624892081234100
Be informative
As additional into slack I find the same behaviour with Risk Accepted findings. Into Metrics I see 0 Risk Accepted findings, but I have 1 Risk Accepted finding
Bug description
No error. Metrics into product, or metrics dushboard has incorrect info