-
Updated
Apr 23, 2021 - Go
security-automation
Here are 303 public repositories matching this topic...
-
Updated
Apr 23, 2021 - Python
-
Updated
Apr 16, 2021 - Go
-
Updated
Apr 16, 2021 - Python
-
Updated
Apr 23, 2021 - Python
-
Updated
Dec 30, 2020 - Python
-
Updated
Apr 23, 2021 - Python
-
Updated
Oct 13, 2020 - Python
-
Updated
Jan 14, 2021 - C#
Summary
Dependabot has identified several security vulnerabilities in the 3rd party libraries Pacbot relies on. In most cases, these vulnerabilities can be resolved by upgrading the library to the most current version.
Maintainers, if you're internal to T-Mobile, you should have been seeing these security alerts coming in over the last several weeks. *Please respond to these in a timely ma
-
Updated
Mar 18, 2021 - Python
-
Updated
Apr 6, 2021 - Go
-
Updated
Mar 21, 2021 - Python
Current Behavior:
When viewing vulns in the Audit Vulnerabilities tab. the Analysis column appears to contain code (enum?) names, e.g. NOT_SET, FALSE_POSITIVE. This problem also occurs in Policy Violations tab.
Steps to Reproduce:
Open the Audit Vulnerabilities tab.
Expected Behavior:
The Analysis column contains language specific analysis values, e.g. Not Set, False Positive
-
Updated
Apr 23, 2021 - Shell
-
Updated
Apr 23, 2021 - Python
-
Updated
Apr 18, 2021 - Python
-
Updated
Dec 9, 2017 - Ruby
Right now a lot of the logging from the tasks does not get propagated back to the user, so we should make sure that all of the tasks are adding logs and errors to the results so that at minimum the data gets put into the worker-log.txt. Ideally we would store this info in datastore so that the clients could query it later (this part is in #115).
-
Updated
Feb 4, 2021 - Python
-
Updated
Apr 22, 2021 - JavaScript
-
Updated
Aug 1, 2018 - Python
-
Updated
Sep 7, 2018
-
Updated
Mar 24, 2021 - Go
-
Updated
Sep 1, 2020 - Go
Feedback
I think that you are doing a very necessary system and your idea is cool, but at the moment it has a lot of bugs. From what I noticed, the assets do not understand the ascii characters and the system crashes. In addition, I did not find a description of the API, I would like to integrate your system into TheHive, or rather make it possible to view information about an asset in TheHive. I believe t
#22 introduced a feature to guess actions that are similar to an existing policy. It currently doesn't support all actions.
Here's things I currently know are missing (comment if you find more):
- KMS:
Encrypt
,Decrypt
,GenerateDataKey
, ... - ECR:
BatchDeleteImage
,BatchGetImage
, ... -
*Deregister*
-
*Modify*
-
*Remove*
- API Gateway: (
DELETE
,
Improve this page
Add a description, image, and links to the security-automation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the security-automation topic, visit your repo's landing page and select "manage topics."
Safety parser relly on a DB of vulnerabilities with CVE infos. This databases is upgraded/modified every month.
This pb is that our unit tests relly on this changing file.
We need to do one of these options: