GuardDuty events sent via CloudWatch rules and SNS emails are ugly.
It is possible to improve them using inputTransformer.
guardduty-event-target.tf
shows an example usage.
from typing import Optional, List | |
from llmlingua import PromptCompressor | |
MODEL_CONFIG = {} | |
MODEL = "microsoft/llmlingua-2-xlm-roberta-large-meetingbank" | |
RATE = 0.33 | |
class LLMLinguaSegment: | |
"""Class representing a single <llmlingua> segment, encapsulating its content, rate, and compress flag.""" | |
import boto3 | |
import botocore | |
def log_request(request, **kwargs): | |
"""Logs all HTTP requests made by boto3 before they are sent.""" | |
print(f"🔍 Intercepted HTTP request:") | |
print(f" - Method: {request.method}") | |
print(f" - URL: {request.url}") | |
print(f" - Headers: {request.headers}") | |
print(f" - Body: {request.body}\n") |
SELECT eventtime, | |
eventname, | |
requestparameters, | |
awsregion, | |
eventsource, | |
resources | |
FROM cloudtrail_662651605507 | |
WHERE year = '2019' | |
AND month IN ('7', '8', '9', '10', '11') | |
AND eventsource = 's3.amazonaws.com' |
SELECT eventtime, | |
eventname, | |
requestparameters, | |
awsregion, | |
eventsource, | |
resources | |
FROM cloudtrail_662651605507 | |
WHERE year = '2019' | |
AND month IN ('7', '8', '9', '10', '11') | |
AND eventsource = 'lambda.amazonaws.com' |
GuardDuty events sent via CloudWatch rules and SNS emails are ugly.
It is possible to improve them using inputTransformer.
guardduty-event-target.tf
shows an example usage.
import boto3 | |
session = boto3.Session(profile_name='ariancho') | |
s3_client = session.client('s3') | |
display_name = s3_client.list_buckets()['Owner']['DisplayName'] | |
print(display_name) | |
for bucket in s3_client.list_buckets()['Buckets']: | |
print(s3_client.get_bucket_acl(Bucket=bucket['Name'])['Owner']['DisplayName']) |
import os | |
import sys | |
import time | |
import random | |
import subprocess | |
FNULL = open(os.devnull, 'w') | |
env = {'HTTPS_PROXY': 'http://localhost:8080/'} | |
cmd = ('aws --region us-east-1 --no-verify-ssl --profile=andres-root s3api delete-object' |
import timeit | |
import lz4.frame | |
import lzf | |
import zlib | |
#import snappy | |
import os | |
from timeit import Timer | |
DATA = open("test.py", "rb").read() | |
DLEN = len(DATA) |
As an application security expert I use Atom to read source code. I would like to be able to have a plugin with features that will help me identify vulnerabilities.
Add annotations to the source code: Select a few lines of code, right click, "Add annotation", text box appears, user types comments on the source code, clicks "Save". All annotations can be seen in a tab. If the code has annotations then it is highlighted differently (change background color)
The plugin implements methods for searching for XSS, SQL injection, etc. The plugin adds a menu
How does Oraclize work? How do they use crypto to guarantee that they are providing unmodified results for the HTTP queries?