
Product
Introducing Repository Labels and Security Policies
Socket is introducing a new way to organize repositories and apply repository-specific security policies.
Supply Chain Security
Vulnerability
Quality
Maintenance
License
Command line tool that helps handle multiple AWS Account Credentials (its Roles and MFAs), when working with AWSCLI sessions.
It opens and controls AWS Sessions using a command-line tool, allowing performing one or all of the following tasks:
Plus, it also tries (if allowed by your AWS Polices) automatically bring and save locally information about your MFA-Devices to be used later on.
When not possible to retrieve account information automactically (due to security reasons), you still can register it locally using this tool. You can save and keep them updated, to help to deal with your AWS Sessions, like:
Save and mantain your credential profiles associated with their respective Roles and MFA Devices.
You can use the command "synchronize" to remotely bring this information (if allowed by your AWS Polices), check help documentation.
The complete help/manual is available inside the AWSee tool itself, check it out:
# To show a short version...
$:~ awsee -h
# Show how to use, see below:
$:~ awsee -u
awsee [TOKEN-MFA] [-p profile] [-r role] [-nt or --new-term]
Examples:
awsee 857946 Open AWS Session with default profile with your six-digit MFA Token
awsee 857946 -p infra Open AWS Session with the passed profile using your six-digit MFA Token
awsee 857946 -p infra -r prod Open AWS Session with the passed profile using your six-digit MFA Token
and immediatelly assume the passed role at this new session
awsee Open AWS Session with default profile, it will check if needs MFA
awsee -p dev Open AWS Session with the passed profile, asks for MFA if needed
awsee -r developer Assume a Role inside the current AWS Session
awsee -p dev -r developer Open AWS Session with the passed profile, and following assume the role
awsee -p prod -r admin Open AWS Session with the passed profile, and following assume the rol
awsee -nt or --new-terminal When opening an AWS Session, will do it in a new terminal
awsee -h or --help Show this and all auxiliary functions (use --help for more information)
awsee -u or --usage Show only how to use, not the auxiliary function
awsee [FUNCTION] Execute an auxiliary function, see below for all available options
# Use the awsee --help to see all the functions and their usage
# More things...
# At the folder ~/.awsee/ you'll find two files that you can customize a few more things:
# ~/.awsee/awsee.ini
### --> Colors on/off
### --> Emoticons on/off
### --> At Windows, the New Terminal to be used (CMD, CMDER or GitBash)
# ~/.awsee/alias/alias_awsee.txt
### --> Add/Remove here your ALIAS/DOSKEYS (Linux/Windows) for new opened sessions, things like:
### ----> DOSKEY ec2=aws ec2 describe-instances --query Reservations[*].Instances[*].InstanceId --output table
### ----> DOSKEY s3=aws s3 ls
### ----> DOSKEY ssmfrodo=aws ssm start-session --target "i-0452a94919225f816"
For more information and details, check here:
FAQs
Utility to help me manage my AWS CLI Session with Profiles, Roles and MFA
We found that awsee demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket is introducing a new way to organize repositories and apply repository-specific security policies.
Research
Security News
Socket researchers uncovered malicious npm and PyPI packages that steal crypto wallet credentials using Google Analytics and Telegram for exfiltration.
Product
Socket now supports .NET, bringing supply chain security and SBOM accuracy to NuGet and MSBuild-powered C# projects.