twilio-labs / gordon
Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive code ownership at scale within an organization
☆20Updated 2 months ago
Alternatives and similar repositories for gordon:
Users that are interested in gordon are comparing it to the libraries listed below
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆59Updated 3 years ago
- Compares and analyzes GCP IAM roles.☆77Updated last month
- A Golang program to rotate AWS & GCP account keys☆65Updated last month
- CloudSplaining on AWS Managed Policies☆41Updated this week
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- ☆28Updated 4 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 4 years ago
- GCP CSPM using Google Sheets☆35Updated 2 weeks ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated last year
- Updated incident response generator for training classes☆44Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Updated 5 years ago
- ☆27Updated 5 months ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆23Updated 11 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆39Updated this week
- a tool to audit the istio service mesh☆173Updated 3 years ago
- ☆49Updated 4 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Assess certain AWS network configurations☆12Updated 6 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆30Updated 6 months ago
- Deliberately vulnerable AWS resources for security assessment demos☆31Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraform☆16Updated 2 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 7 months ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 3 years ago
- OWASP Threat Dragon with Gitlab Integration☆25Updated 7 years ago
- ☆83Updated 5 years ago