cloudsploit icon indicating copy to clipboard operation
cloudsploit copied to clipboard

Cloud Security Posture Management (CSPM)

Results 245 cloudsploit issues
Sort by recently updated
recently updated
newest added

We're currently considering deploying Cloudsploit in our GCP setup. In addition to full-org scans, we see some cases where we'd like Cloudsploit to only scan certain parts of our infrastructure,...

AWS SDK for JavaScript (v2) is entering into maintenance mode in 2023. We need to migrate code to use AWS SDK for JavaScript (v3). **How to upgrade** Following this documentation,...

enhancement
dependencies

`nodemon` `1.3.5 - 2.0.16 || 2.0.18` Depends on vulnerable versions of `chokidar` `1.0.0-rc1 - 2.1.8` that depends on vulnerable versions of `glob-parent` `glob-parent` before `5.1.2` vulnerable to Regular Expression Denial...

Currently there is an option to generate the output in JSON format that basically print the result array in this part of the [code](https://github.com/aquasecurity/cloudsploit/blob/master/postprocess/output.js#L127) when using the parameter **"--json=filename"** Example:...

It would be nice if I could incorporate cloudsploit into my CD pipeline in a similar fashion to how I incorporated Trivy into my CI pipeline. Looking at this repo,...

This PR will allow to generate the output using SARIF JSON format when using the following command ```bash node index.js --cloud aws --config ./config.js --sarif=output.sarif.json --console=none --plugin s3Encryption ``` Basically...

Hi team, would be great to be able to import findings into Defectdojo to follow up the whole app sec program including cloud.

I do understand the permission issues, however even root and escalating the permissions on the given folder is not working. root@ubuntu:/tmp/cloudsploit# chmod 777 /tmp/cloudsploit root@ubuntu:/tmp/cloudsploit# ./index.js bash: ./index.js: Permission denied...

DOCKERFILE LINE 28 ENTRYPOINT ["cloudsploitscan"] includes TYPO ... should be ["cloudsploit-scan"]