-
Updated
Oct 8, 2021 - Go
security-automation
Here are 324 public repositories matching this topic...
-
Updated
Oct 8, 2021 - Python
-
Updated
Oct 6, 2021 - Go
-
Updated
Oct 4, 2021 - Python
-
Updated
Oct 7, 2021 - Python
-
Updated
Jul 3, 2021 - C#
-
Updated
Aug 22, 2021 - Python
Description of problem:
The bash remediation of selinux_state runs:
fixfiles onboot
fixfiles -f relabel
whereas the Ansible remediation doe
-
Updated
Oct 13, 2020 - Python
-
Updated
Oct 8, 2021 - Python
Summary
Dependabot has identified several security vulnerabilities in the 3rd party libraries Pacbot relies on. In most cases, these vulnerabilities can be resolved by upgrading the library to the most current version.
Maintainers, if you're internal to T-Mobile, you should have been seeing these security alerts coming in over the last several weeks. *Please respond to these in a timely ma
-
Updated
Aug 9, 2021 - Python
-
Updated
Apr 6, 2021 - Go
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
-
Updated
Oct 6, 2021 - Shell
-
Updated
Oct 8, 2021 - Python
-
Updated
Jul 17, 2021 - Python
-
Updated
Oct 8, 2021 - JavaScript
-
Updated
Dec 9, 2017 - Ruby
Right now a lot of the logging from the tasks does not get propagated back to the user, so we should make sure that all of the tasks are adding logs and errors to the results so that at minimum the data gets put into the worker-log.txt. Ideally we would store this info in datastore so that the clients could query it later (this part is in #115).
-
Updated
Feb 4, 2021 - Python
-
Updated
Aug 1, 2018 - Python
-
Updated
Oct 7, 2021 - Go
-
Updated
Sep 7, 2018
Feedback
I think that you are doing a very necessary system and your idea is cool, but at the moment it has a lot of bugs. From what I noticed, the assets do not understand the ascii characters and the system crashes. In addition, I did not find a description of the API, I would like to integrate your system into TheHive, or rather make it possible to view information about an asset in TheHive. I believe t
#22 introduced a feature to guess actions that are similar to an existing policy. It currently doesn't support all actions.
Here's things I currently know are missing (comment if you find more):
- KMS:
Encrypt,Decrypt,GenerateDataKey, ... - ECR:
BatchDeleteImage,BatchGetImage, ... -
*Deregister* -
*Modify* -
*Remove* - API Gateway: (
DELETE,
-
Updated
Sep 1, 2020 - Go
Improve this page
Add a description, image, and links to the security-automation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the security-automation topic, visit your repo's landing page and select "manage topics."


Slack us first!
Hello. I write about problem here:
https://owasp.slack.com/archives/C2P5BA8MN/p1624892081234100
Be informative
As additional into slack I find the same behaviour with Risk Accepted findings. Into Metrics I see 0 Risk Accepted findings, but I have 1 Risk Accepted finding
Bug description
No error. Metrics into product, or metrics dushboard has incorrect info