-
Updated
Nov 5, 2021 - Go
security-automation
Here are 332 public repositories matching this topic...
-
Updated
Nov 3, 2021 - Go
-
Updated
Nov 5, 2021 - Python
-
Updated
Nov 5, 2021 - Python
-
Updated
Nov 5, 2021 - Python
-
Updated
Jul 3, 2021 - C#
-
Updated
Aug 22, 2021 - Python
Description of problem:
The bash remediation of selinux_state runs:
fixfiles onboot
fixfiles -f relabel
whereas the Ansible remediation doe
-
Updated
Oct 13, 2020 - Python
-
Updated
Oct 8, 2021 - Python
Summary
Dependabot has identified several security vulnerabilities in the 3rd party libraries Pacbot relies on. In most cases, these vulnerabilities can be resolved by upgrading the library to the most current version.
Maintainers, if you're internal to T-Mobile, you should have been seeing these security alerts coming in over the last several weeks. *Please respond to these in a timely ma
-
Updated
Aug 9, 2021 - Python
We have started to include license details in our version identifier configuration here: https://github.com/e-m-b-a/emba/blob/master/config/bin_version_strings.cfg
This is in a very early stage and need your help. If you know the license of some of the software components please include it directly in the configuration and bring up a pull request or comment to this issue with the license and th
-
Updated
Apr 6, 2021 - Go
The current swagger definition is autogenerated. The automatically generated definitions rely on reflection and annotations to create the documentation. The reflection capabilities are poor at best and lead to missing API parameters. Annotations can help in some cases, but the only fix for Swagger is to create individual POJOs for every possible request. This will lead to unnecessary large number
-
Updated
Oct 20, 2021 - Shell
-
Updated
Nov 5, 2021 - Python
-
Updated
Oct 9, 2021 - Python
-
Updated
Nov 5, 2021 - JavaScript
-
Updated
Dec 9, 2017 - Ruby
Right now a lot of the logging from the tasks does not get propagated back to the user, so we should make sure that all of the tasks are adding logs and errors to the results so that at minimum the data gets put into the worker-log.txt. Ideally we would store this info in datastore so that the clients could query it later (this part is in #115).
-
Updated
Feb 4, 2021 - Python
-
Updated
Oct 27, 2021 - Go
-
Updated
Aug 1, 2018 - Python
-
Updated
Sep 7, 2018
#22 introduced a feature to guess actions that are similar to an existing policy. It currently doesn't support all actions.
Here's things I currently know are missing (comment if you find more):
- KMS:
Encrypt,Decrypt,GenerateDataKey, ... - ECR:
BatchDeleteImage,BatchGetImage, ... -
*Deregister* -
*Modify* -
*Remove* - API Gateway: (
DELETE,
Feedback
I think that you are doing a very necessary system and your idea is cool, but at the moment it has a lot of bugs. From what I noticed, the assets do not understand the ascii characters and the system crashes. In addition, I did not find a description of the API, I would like to integrate your system into TheHive, or rather make it possible to view information about an asset in TheHive. I believe t
Improve this page
Add a description, image, and links to the security-automation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the security-automation topic, visit your repo's landing page and select "manage topics."


Slack us first!
Hello. I write about problem here:
https://owasp.slack.com/archives/C2P5BA8MN/p1624892081234100
Be informative
As additional into slack I find the same behaviour with Risk Accepted findings. Into Metrics I see 0 Risk Accepted findings, but I have 1 Risk Accepted finding
Bug description
No error. Metrics into product, or metrics dushboard has incorrect info