Ryan Gerstenkorn
Ryan Gerstenkorn
Didn't know about this one. I'm all for this, but also worth considering vagrant also: * Allows code execution on the host * https://blog.ryanjarv.sh/2019/06/08/malicious-vagrant-boxes.html * Allows unfiltered access to the...
Thanks for the PR! Apologies for the delay here. I think it makes sense to pull the findings enumerated in detection__enum_services if no finding is passed in the args then...
Note to self: One thing to look into though is if the token included during runs has the ability to make changes to the wiki.
On this PR it looks like the changes are primarily this commit: https://github.com/RhinoSecurityLabs/pacu/pull/282/commits/588fd57eb0f23425b13e380d72159b3758f4582b Any reason for changing these names? Feel like they make sense as is, so not sure if...
Will need to look into this more but I'm thinking this may duplicate functionality already in the detection_disruption module.
Awesome, thank you for the PR! Have been thinking we need to do something about extracting some of the lambda functionality out into common code. I may need to come...
Appreciate the PR! We unfortunately just got a EKS module merged into the dev branch however so we may not be able to merge this as is. I'll try to...
I think we could improve visibility on what's being worked on as well, I'll see what we can do there. FYI I'm keeping this open to see if we can...
Thanks for reporting this. I'm not quite sure why this would happen, but we'll take a look into it. In the mean time do you mind installing from master and...
I'd also be curious if renaming the db in ~/.local/share/pacu/ and retrying makes any difference, if your able to try that.