-
Updated
Jul 10, 2019
cloud-security
Here are 121 public repositories matching this topic...
-
Updated
Mar 24, 2022 - Python
-
Updated
Feb 14, 2022 - HTML
- There are still mentions of a triage worksheet. "Cloudsplaining identifies violations of least privilege in AWS IAM policies and generates a pretty HTML report with a triage worksheet. It can scan all the policies in your AWS account or it can scan a single policy file." The worksheet is mentioned several times.
- As shown in the above, there is no mention of multiple AWS accounts
- The GIF st
Summary
Dependabot has identified several security vulnerabilities in the 3rd party libraries Pacbot relies on. In most cases, these vulnerabilities can be resolved by upgrading the library to the most current version.
Maintainers, if you're internal to T-Mobile, you should have been seeing these security alerts coming in over the last several weeks. *Please respond to these in a timely ma
-
Updated
Nov 4, 2021 - Shell
-
Updated
Mar 11, 2022
-
Updated
Mar 21, 2022 - Go
-
Updated
Mar 26, 2022 - Go
-
Updated
Mar 21, 2022 - HCL
-
Updated
Feb 13, 2022 - PowerShell
-
Updated
Feb 5, 2022
-
Updated
Mar 25, 2022 - Python
-
Updated
Feb 28, 2022 - Go
-
Updated
Mar 25, 2022 - Go
-
Updated
Mar 18, 2022
-
Updated
Jul 20, 2020 - Go
-
Updated
Jun 1, 2021 - Python
-
Updated
Nov 23, 2021 - Go
-
Updated
Dec 19, 2021
-
Updated
Mar 15, 2022 - Python
-
Updated
Dec 1, 2021 - Python
-
Updated
Mar 1, 2022
-
Updated
Mar 25, 2022 - Go
-
Updated
Apr 28, 2020
In the docs, you explain which environment variables you export after an AWS role is assumed.
AWS_REGION
AWS_ACCESS_KEY_ID
AWS_SECRET_ACCESS_KEY
AWS_SESSION_TOKEN
GRANTED_AWS_ROLE_PROFILE
Can you add AWS_SESSION_EXPIRATION to this list? I'm using the starship prompt and exporting this variable allows you to display h
-
Updated
Mar 16, 2021 - HCL
Improve this page
Add a description, image, and links to the cloud-security topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the cloud-security topic, visit your repo's landing page and select "manage topics."
Enhancement Request
Other security scanning tools (e.g.
checkovandtfsec) have a--soft-failflag or equivalent option that allows you to always exit with 0 status.Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira