austinsonger@MacBookPro easy % ./target/debug/authorized --config config.toml poam stats | |
2025-10-06T18:21:33.299299Z INFO authorized_cli: Initialized authorized-cli v0.1.0 | |
2025-10-06T18:21:33.300963Z INFO authorized_cli::config: Loading configuration from: config.toml | |
2025-10-06T18:21:33.303040Z INFO authorized_cli::config: Configuration loaded successfully | |
POA&M Statistics: | |
Total Items: 3 | |
By Status: | |
Open: 2 | |
In Progress: 1 |
#!/bin/bash | |
# Modified: 2025-10-05 | |
# Phase Console Installation Script for Rocky Linux and CentOS | |
# Installs and configures Phase Console server with Tor hidden service | |
set -euo pipefail | |
# Configuration variables | |
PHASE_CONSOLE_DIR="/opt/phase-console" | |
PHASE_USER="phaseuser" |
#!/bin/bash | |
# Ubuntu 22.04 | |
# Please also allow `80, 443, 3000` ports in the VM network rules if apply | |
# run as sudo | |
if [ "$EUID" -ne 0 ] | |
then echo "Please run as root or use sudo" | |
exit | |
fi |
RFC-0012 Continuous Vulnerability Management Standard Note: FedRAMP requirements documents use RFC 2119 key words to indicate requirement levels.
RFC Front Matter Due to the nature of this RFC, FedRAMP will be hosting two public events and public informal discussions in the FedRAMP Community about this RFC. General questions are encouraged in these public discussions to sharpen and focus public comment but the public must submit formal public comments for official consideration during the comment period.
Status: Open Created By: FedRAMP Start Date: 2025-07-15 Closing Date: 2025-08-21
Removing a specific USB device (like a flash drive or security key) triggers an immediate shutdown. It combines the following:
- A launch daemon that monitors USB devices
- A script that checks if your specific USB is still connected
- A shutdown command if it disappears
- Edit the DEVICE_NAME at the top of the script to match your USB stick (use system_profiler SPUSBDataType).
const express = require("express"); | |
const crypto = require("crypto"); | |
const router = express.Router(); | |
//Put your scopes here | |
const KICK_SCOPES = [ | |
"user:read", | |
"channel:read", | |
"channel:write", | |
"chat:write", |
This solution provides a fully automated AWS-native mechanism to monitor, detect, and alert on unauthorized changes to page scripts. It leverages AWS CloudFront, Lambda@Edge, and the Hono framework to seamlessly enforce content integrity and real-time monitoring for scripts that are served as part of processing pages.
✨ Key Features
Feature | Description |
---|
#!/bin/bash | |
prefFile="$(readlink -f "/var/lib/plexmediaserver/Library/Application Support/Plex Media Server/Preferences.xml")" | |
echo "Please go to https://plex.tv/claim in order to obtain a new claim-code, then type it below" | |
echo -n "Claim Code: " | |
read PLEX_CLAIM | |
clientId=$(sed -n 's/.*ProcessedMachineIdentifier="\(\S*\)".*/\1/p' "${prefFile}") |