
Research
Malicious npm Packages Impersonate Flashbots SDKs, Targeting Ethereum Wallet Credentials
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
resoto-plugin-tagvalidator
Advanced tools
Tag Validator plugin for Resoto
This plugin validates the contents of expiration tags. With it you can enforce a max. expiration length for certain resources in an account. For instance you could have an org policy that says in our "dev" account compute instances are only allowed to exist for 2 days max. Then this plugin can ensure that the expiration tag on those instances is set to no more than 2 days. If it is set to e.g. 50h it would be corrected down to 48h.
In resh
execute
> config edit resoto.worker
and find the following section
plugin_tagvalidator:
# Configuration for the plugin
# See https://github.com/someengineering/resoto/tree/main/plugins/tagvalidator for syntax details
config:
default:
expiration: '24h'
kinds:
- 'aws_ec2_instance'
- 'aws_vpc'
- 'aws_cloudformation_stack'
- 'aws_elb'
- 'aws_alb'
- 'aws_alb_target_group'
- 'aws_eks_cluster'
- 'aws_eks_nodegroup'
- 'aws_ec2_nat_gateway'
accounts:
aws:
'123465706934':
name: 'eng-audit'
'123479172032':
name: 'eng-devprod'
'123453451782':
name: 'sales-lead-gen'
expiration: '12h'
'123415487488':
name: 'sales-hosted-lead-gen'
expiration: '8d'
# Dry run
dry_run: false
# Enable plugin?
enabled: false
The config contains a default section with the expiration that should be used for all accounts by default. The kinds section contains the list of kinds that these expiration tag rules apply to. The accounts section contain the cloud ids followed by the account ids. Each account id must contain a name
and optionally an expiration
that overwrites the global default.
FAQs
Resoto Tag Validator Plugin
We found that resoto-plugin-tagvalidator demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Four npm packages disguised as cryptographic tools steal developer credentials and send them to attacker-controlled Telegram infrastructure.
Security News
Ruby maintainers from Bundler and rbenv teams are building rv to bring Python uv's speed and unified tooling approach to Ruby development.
Security News
Following last week’s supply chain attack, Nx published findings on the GitHub Actions exploit and moved npm publishing to Trusted Publishers.