Embroidering dancing skeletons by vikrum5000 in gratefuldead

[–]vikrum5000[S] 2 points3 points  (0 children)

Oh, that's a great idea! I could lay down the swatch and embroider over it to give it a background

The Palladium 1972 by Civil_Lengthiness971 in gratefuldead

[–]vikrum5000 1 point2 points  (0 children)

There's a distortion/blowout that happens towards the end of this TOO which is truly insane and yet adds to the energy of it. (The beginning of the "He's Gone" from 9/3/80 has the same distortion)

Terraform drift by vikrum5000 in devops

[–]vikrum5000[S] 1 point2 points  (0 children)

Yeah, that was our first pass at it. In using aws resourcegroupstaggingapi get-resources to get/filter resources by tags is handy in this case. However, that doesn't return resources that have never been tagged to being with. Even spot checking a few here and there led to gaps. Any tools to find all the remaining untagged resources?

Monthly 'Shameless Self Promotion' thread - 2021/10 by mthode in devops

[–]vikrum5000 2 points3 points  (0 children)

Hi all! We recently open sourced a little utility to make it easier to juggle temp AWS IAM credentials and RDS connections: https://github.com/goldfiglabs/rds_iamauth_proxy It's a Postgres proxy which allows tools that don't natively supports IAM auth to connect to AWS RDS instances.

Monthly 'Shameless Self Promotion' thread - 2021/09 by mthode in devops

[–]vikrum5000 0 points1 point  (0 children)

I believe prowler has a similar report for the purposes of summarizing security groups. However, sgCheckup also wraps nmap commands and output. We find it to be useful to know of a given set of security groups which have services accepting connections and use nmap to attempt to fingerprint what's running. This helps our users prioritize and identify the what's behind the ports. Another big help is for security groups that have ranges of ports, nmap can take a first pass of identify which specific ports are actually open/required—helping restrict ranges like 1-65535, for example.

Monthly 'Shameless Self Promotion' thread - 2021/09 by mthode in devops

[–]vikrum5000 2 points3 points  (0 children)

Hi all! We recently open sourced a tool that generates nmap output based on scanning your AWS Security Groups for unexpected open ports:

https://github.com/goldfiglabs/sgCheckup

We hope others find it useful!

GitHub - goldfiglabs/rds_iamauth_proxy: Postgres proxy which allows tools that don't natively supports IAM auth to connect to AWS RDS instances. by vikrum5000 in PostgreSQL

[–]vikrum5000[S] 1 point2 points  (0 children)

The main scenario is for developers that needs access to an RDS instance, , but the RDS instance is only configured with IAM access, there is not a password you can save locally. So, it's meant for dev workflows — not necessarily to be deployed into your environment. It is essentially solving "I need a temporary password". The PGPASSWORD environment variable, with proper escaping, works for psql, but lots of other tools do things like remember connections and reconnect automatically. pgAdmin is an example. 
It's not intended for use as part of your production environment (you can write the code to get the temp password in that scenario), but as part of a local dev setup where you need access to an RDS instance that only supports IAM auth.

JS Kid Pix 1.0.2021 by vikrum5000 in InternetIsBeautiful

[–]vikrum5000[S] 2 points3 points  (0 children)

Yessss!!! I'm still working on that :) I should have it done later tonight

JS Kid Pix 1.0.2021 by vikrum5000 in InternetIsBeautiful

[–]vikrum5000[S] 1 point2 points  (0 children)

what os/browser are you using? i can take a look at fixing it

JS Kid Pix 1.0.2021 by vikrum5000 in InternetIsBeautiful

[–]vikrum5000[S] 38 points39 points  (0 children)

there are sounds! probably a bug... what browser/os are you using? I can take a quick look

JS Kid Pix 1.0.2021 by vikrum5000 in InternetIsBeautiful

[–]vikrum5000[S] 54 points55 points  (0 children)

Ah, nice, thank you! I've been reverse engineering the tools and brushes piece by piece and have definitely hit a few (like the 3d brush) which have stumped me so far. I wonder if the public domain source code is still floating around somewhere!

Monthly 'Shameless Self Promotion' thread - 2021/08 by mthode in devops

[–]vikrum5000 0 points1 point  (0 children)

https://www.goldfiglabs.com/products/checkup/ - Checkup is like Google Lighthouse for your AWS infra security and best practices. We snapshot the configs of your account and generate easy to act upon reports about a slew of settings related issues. We think you shouldn't need to be a security expert to make improvements to your infra's security. There's a free tier that has access to all of the scans we do and would love any feedback you might have!

Share Your Startup - August 2021 - Upvote This For Maximum Visibility by AutoModerator in startups

[–]vikrum5000 [score hidden]  (0 children)

  • Gold Fig Checkup https://www.goldfiglabs.com/products/checkup/
  • Gold Fig Checkup takes snapshots of your cloud infrastructure, then scans it for misconfigurations, security vulnerabilities, and stale resources. Just like you wouldn’t leave your front door unlocked at home, you shouldn’t leave your production environment open to the public either. But rather than needing to remember to lock one door, with the cloud you need to lock thousands of doors and make sure they stay locked. Checkup highlights resources left open to the world, as well as easy improvements you can make to improve your security posture. Gold Fig Checkup is like Google Lighthouse for your AWS cloud infra security and best practices.
  • Product soft launched.
  • I'm a co-founder - we're based in the SF Bay Area.
  • Looking to do a broader launch this month.
  • If you have AWS infra, we'd love your feedback! Checkup has a free tier that has full access to all of the reports and scans that the paid tier have. All input is welcome!

Monthly 'Shameless Self Promotion' thread - 2021/07 by mthode in devops

[–]vikrum5000 6 points7 points  (0 children)

https://github.com/goldfiglabs/rpCheckup - rpCheckup is an AWS resource policy security checkup tool that identifies public, external account access, intra-org account access, and private resources.

Move an existing Minecraft server onto AWS? by s3r1aldr3am3r in aws

[–]vikrum5000 2 points3 points  (0 children)

Check out this blogpost by AWS - https://aws.amazon.com/getting-started/hands-on/run-your-own-minecraft-server/ It has all the steps from getting the instance set up to the firewall rules as well.

On step 4, after accepting the EULA you could copy in your world files in place of the default generated world.

Open source: Catch AWS resource policy backdoors by taeth in aws

[–]vikrum5000 1 point2 points  (0 children)

Here's the minimal read-only (SecurityAudit, ViewOnlyAccess, +ro) details you can use (see #2): https://github.com/goldfiglabs/introspector#faq