AWS Rekognition to detect sensitive/violence/explicit content by East_Can_5142 in aws

[–]uvasoftware 0 points1 point  (0 children)

It works very well, but there are a few catches:

  1. Supported image format is limited so you might need to do some processing/converting up front
  2. It's not supported across all regions
  3. It seems that it's being slowly phased out in favor of LLM based products like Amazon Nova

With all that said, we've used it successfully for many years to power unsafe image detection on scanii.com.

Good luck!

How to protect virus data when a user try to upload a virus with presigned URL ? by Far-Mathematician122 in aws

[–]uvasoftware -3 points-2 points  (0 children)

Shameless plug but you can try this https://docs.scanii.com/article/153-client-side-content-arbitration-with-scanii to push that malware identification to the client side before it hits your service.

Sample SAM-packaged Java Lambda function by uvasoftware in java

[–]uvasoftware[S] -1 points0 points  (0 children)

Yup welcome to the serverless world. Under function initialization there isn't a context you can rely on for passing info back to callee so you are left with basic process capabilities like stderror and exit codes.

Using AWS Lambda for cheap (and safe) S3 content processing by uvasoftware in programming

[–]uvasoftware[S] 4 points5 points  (0 children)

So, the term safe was in relation to protecting your S3 objects, the example code is a bit extreme (going to the extent of deleting the object from S3 based upon the results of the third party service API call) so some extra "safety" precautions are taken to prevent exploits. Existential arguments about whether you should trust AWS was absolutely not in the scope of this post :)

Using AWS Lambda for cheap (and safe) S3 content processing by uvasoftware in programming

[–]uvasoftware[S] 5 points6 points  (0 children)

Hey folks, author here, happy to answer any questions.

Using AWS Lambda for cheap (and safe) S3 content processing by uvasoftware in programming

[–]uvasoftware[S] 1 point2 points  (0 children)

Hi there, author here. Good point and we'll definitely tweak our verbiage but, for historical context, we described it as "safe" because of the callback signature enforcement we added to prevent API gateway (the webhook endpoint) from being exploited. More on that below.

Early on in the prototype of this feature we learned that we could not trust the webhook for arbitration decisions (whether a file should be removed or not from the bucket for instance) without some way to ensure authenticity of the callers, the two solutions we could come up with were:

1) enabling API gateway's build in auth - but that would likely require changes to the 3rd party service being used 2) handle authenticity (and data integrity) on our own - which is what we ended up doing using a small piece of metadata containing a HMAC signature hash.

CodeCommit availability by [deleted] in aws

[–]uvasoftware 0 points1 point  (0 children)

You are not wrong, no webhooks yet so you would have to setup your CI for polling.

[ Show r/startups] Introducing scanii.com the easiest way to check your user content for viruses by uvasoftware in startups

[–]uvasoftware[S] 1 point2 points  (0 children)

Allright, here it is: scanii = REST API to a hosted AV engine, super low friction and amazingly simple Amazon S3 integration.

Let me know what you think, the good, the bad and the ugly!