-
Updated
Jul 23, 2021 - Go
security-automation
Here are 314 public repositories matching this topic...
-
Updated
Jul 22, 2021 - Python
-
Updated
Jul 20, 2021 - Go
-
Updated
Jul 2, 2021 - Python
-
Updated
Jul 22, 2021 - Python
-
Updated
Dec 30, 2020 - Python
-
Updated
Jul 3, 2021 - C#
-
Updated
Jul 22, 2021 - Python
-
Updated
Oct 13, 2020 - Python
Summary
Dependabot has identified several security vulnerabilities in the 3rd party libraries Pacbot relies on. In most cases, these vulnerabilities can be resolved by upgrading the library to the most current version.
Maintainers, if you're internal to T-Mobile, you should have been seeing these security alerts coming in over the last several weeks. *Please respond to these in a timely ma
-
Updated
May 24, 2021 - Python
-
Updated
Jun 1, 2021 - Python
-
Updated
Apr 6, 2021 - Go
Current Behavior:
When viewing vulns in the Audit Vulnerabilities tab. the Analysis column appears to contain code (enum?) names, e.g. NOT_SET, FALSE_POSITIVE. This problem also occurs in Policy Violations tab.
Steps to Reproduce:
Open the Audit Vulnerabilities tab.
Expected Behavior:
The Analysis column contains language specific analysis values, e.g. Not Set, False Positive
-
Updated
Jul 14, 2021 - Shell
-
Updated
Jul 21, 2021 - Python
-
Updated
Jul 17, 2021 - Python
-
Updated
Jul 19, 2021 - JavaScript
-
Updated
Dec 9, 2017 - Ruby
Right now a lot of the logging from the tasks does not get propagated back to the user, so we should make sure that all of the tasks are adding logs and errors to the results so that at minimum the data gets put into the worker-log.txt. Ideally we would store this info in datastore so that the clients could query it later (this part is in #115).
-
Updated
Feb 4, 2021 - Python
-
Updated
Aug 1, 2018 - Python
-
Updated
Sep 7, 2018
-
Updated
May 20, 2021 - Go
#22 introduced a feature to guess actions that are similar to an existing policy. It currently doesn't support all actions.
Here's things I currently know are missing (comment if you find more):
- KMS:
Encrypt
,Decrypt
,GenerateDataKey
, ... - ECR:
BatchDeleteImage
,BatchGetImage
, ... -
*Deregister*
-
*Modify*
-
*Remove*
- API Gateway: (
DELETE
,
Feedback
I think that you are doing a very necessary system and your idea is cool, but at the moment it has a lot of bugs. From what I noticed, the assets do not understand the ascii characters and the system crashes. In addition, I did not find a description of the API, I would like to integrate your system into TheHive, or rather make it possible to view information about an asset in TheHive. I believe t
-
Updated
Sep 1, 2020 - Go
Improve this page
Add a description, image, and links to the security-automation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the security-automation topic, visit your repo's landing page and select "manage topics."
Slack us first!
Hello. I write about problem here:
https://owasp.slack.com/archives/C2P5BA8MN/p1624892081234100
Be informative
As additional into slack I find the same behaviour with Risk Accepted findings. Into Metrics I see 0 Risk Accepted findings, but I have 1 Risk Accepted finding
Bug description
No error. Metrics into product, or metrics dushboard has incorrect info