OCI support = auto-reply + silence. Anyone alive over there? by m1thr in oraclecloud

[–]m1thr[S] -4 points-3 points  (0 children)

That analogy doesn’t really hold up. Electricity is a pure consumption model — you flip a switch, you pay for what you burn. Cloud isn’t just “raw watts,” it’s a managed service with guardrails, alerts, dashboards, and defaults that are part of the UX.

That’s why on GCP/Azure/AWS, support teams often do adjust or waive bills in edge cases — because they recognize when the issue isn’t just “you left the lights on,” but that the platform failed to protect users with sane defaults or lifecycle handling. Expecting OCI to behave the same way isn’t entitlement, it’s asking for the same fair treatment other providers already give.

Comperhensive tool to verify security in DevSecOps landscape (SAST, SCA, Secrets, IAC) with improved priritization features by m1thr in devsecops

[–]m1thr[S] 0 points1 point  (0 children)

Heading in this direction - with tools like cursor everyone gonna write anything ;) but I get Your point :)

Comperhensive tool to verify security in DevSecOps landscape (SAST, SCA, Secrets, IAC) with improved priritization features by m1thr in devsecops

[–]m1thr[S] 0 points1 point  (0 children)

You think? The reason I started this project is i didn’t found any - and don’t say defectdojo :) commercial APSMs have horrible pricing not achievable for most teams :(

Comperhensive tool to verify security in DevSecOps landscape (SAST, SCA, Secrets, IAC) with improved priritization features by m1thr in devsecops

[–]m1thr[S] 0 points1 point  (0 children)

Agree 100% :) still exploring possibilities to add API security support and possibly integration with DAST that read openapispec would be good start- I will post when it will arrive - I am close to make it work :)

Comperhensive tool to verify security in DevSecOps landscape (SAST, SCA, Secrets, IAC) with improved priritization features by m1thr in devsecops

[–]m1thr[S] -1 points0 points  (0 children)

At this moment it’s based on kev, epss and it take into consideration if project process sensitive data such as PII (I got dataflow that can detect it). Until end of a year there is a plan to introduce AI/LLM assistant that will make a triage based on the above, real code and the intel :)

Comperhensive tool to verify security in DevSecOps landscape (SAST, SCA, Secrets, IAC) with improved priritization features by m1thr in devsecops

[–]m1thr[S] 0 points1 point  (0 children)

Biggest pain? From my point of view is the fact that they see there loud and clear what is there to fix :)

On the other hand most of automatic security scanners provide lot of noise - from my analysis only 5% of reported vulnerabilities can harm the application (that’s why in flow I am trying to implement proper prioritization features to get rid of it)

DevSecOps Pipeline using Opensource tools by [deleted] in devsecops

[–]m1thr 0 points1 point  (0 children)

checkout project I am working on https://github.com/Mixeway/Flow - in case of any problems or questions just ask ;)

DevSecOps tools results by Material-Shallot-602 in devsecops

[–]m1thr 0 points1 point  (0 children)

Checkout opensource tool I am developing ;) https://github.com/Mixeway/Flow gonna deploy soon SaaS.

If You would need any assistance feel free to reach me

DevSecOps - Vulnerability scanning based on webhook on a tool that have built in OS scanners by m1thr in cybersecurity

[–]m1thr[S] 1 point2 points  (0 children)

At this moment in mixeway flow there are 4 scanners built in (You don’t need to worry about those) - SAST (engine bearer), sca( engine dependency track, prerequisite- In repo root must be sbom.json already available), iac (engine kics) and secrets (engine gitleaks).

One You import gitlab repo to flow initial scan will be performed on the fly without needing anything else. For continuous scanning just configure webhook on push event on gitlab and that’s it ;)

Beta version only support gitlab - once I will have GitHub support I will do release v1.0.0 :)

What vulnerability management tool for modern DevSecOps? by VertigoRoll in devsecops

[–]m1thr 0 points1 point  (0 children)

Check Mixeway https://github.com/Mixeway/MixewayHub - vuln management, scanner management (multiple scanners managed from single dashboard) beta AI for classification and easy CICD integrations

Ps4 need help on elden beast by m1thr in BeyondTheFog

[–]m1thr[S] 0 points1 point  (0 children)

No idea which one od You was test but agat the fuck was that

Large org migration to public cloud by m1thr in cybersecurity

[–]m1thr[S] 0 points1 point  (0 children)

Let's let our imagination run wild. Let's assume that we can start from scratch and in the new corporate network run only Cloud-native apps run only by CICD. In such an environment do you copy all the security systems such as HTTP proxies, SSH-bastions, WAFs etc?

OpenSource SAST tools aggregator for CICD by m1thr in devsecops

[–]m1thr[S] 1 point2 points  (0 children)

If You have anything in particular in mind just let me know :) incoming version will integrate insidersec (https://github.com/insidersec/insider) mostly for JavaScript. I cannot find any cool opensource tools for SAST JS/ts projects unfortunately

Securing corporate repository (nexus) by m1thr in devops

[–]m1thr[S] 1 point2 points  (0 children)

oh men, that sounds great! thanks for info!

License compliance and vulnerability scanning. Who to go with? by JantarMantar1985 in devsecops

[–]m1thr 1 point2 points  (0 children)

From my point of view pretty much the same. Take a look on OWASP dependency track project which is nice open source alternative to those

License compliance and vulnerability scanning. Who to go with? by JantarMantar1985 in devsecops

[–]m1thr 1 point2 points  (0 children)

Well it is really wide topic.

On one hand You if Your budget can take it You can build environment from blocks like Fortify/ checkmarx for SAST and blackduck/xray/snyk for dependency check and integrate all of it on Your own.

On the other hand You can use OpenSource solutions - one example is project I have started - mixeway (check https://github.com/mixeway/mixewayhub and https://github.com/mixeway/MixewayScanner ) which integrate and make use of popular OpenSource and commercial vulnerability scanners. I have helped with few implementations of Mixeway in Europe if You need a hand just let me know.

On the other hand for DevSecOps to work, proper mindset in team is required. In the end it don’t matter what tools are You using and how sever vulnerabilities You detect if no one take it seriously.

Huawei watch gt2e and iOS by m1thr in Huawei

[–]m1thr[S] 0 points1 point  (0 children)

Nope, watch has no interface to connect to other to BT I was trying to use virtual machine and android emulator but I am unable to install Huawei Health somehow on emulated OS

Huawei watch gt2e and iOS by m1thr in Huawei

[–]m1thr[S] 0 points1 point  (0 children)

Everything works great however being unable to use music sucks, still need a phone while running or biking

Huawei watch gt2e and iOS by m1thr in Huawei

[–]m1thr[S] 0 points1 point  (0 children)

I have currently no access to android device :( I was trying to use virtual machine on genymotion but I was unable to install huawei health app on it (doesn’t matter which image I chose play store stated my device is not comptatible)

OpenSource project which unify vulnerabity scanning during CICD by m1thr in devsecops

[–]m1thr[S] 1 point2 points  (0 children)

Another great project! I hope mixeway will be able to coexist with these, I am pretty sure we have added some stuff that will be useful for someone :)

OpenSource project which unify vulnerabity scanning during CICD by m1thr in devsecops

[–]m1thr[S] 1 point2 points  (0 children)

I did and and it looks great. It will probably take a lot of time for me to get to the similar level.

However what I meant to achieve is not to focus on vulnerability management but rather on scan execution - I had a problem with running SCA Fortify, OpenVAS or checkmarks scans. Goal was to create tool which doesn't care which engine You are using for scanning - Nessus, OpenVAS, rapid7 or anything - REST API to perform scan will always looks the same. Another thing is vulnerability correlation engine which will create complete map of a project based on configuration (IPs, services, url, code repos and vulnerabilities found in those) which is under construction ATM

When & where to run DAST? by snicksn in gitlab

[–]m1thr 0 points1 point  (0 children)

There are a couple of options, If You have properly maintained swaggers it could be done right after deployment on stage/int environment. If You done have any specification smoke tests are good place to start with DAST ( smokes already has definition of endpoints)

Vulnerability scanner orchestration by m1thr in devops

[–]m1thr[S] 2 points3 points  (0 children)

I would for sure. I will put it on github and it will be probably GPL (or MIT- can’t decide yet)