Skip to content
This repository was archived by the owner on May 27, 2025. It is now read-only.

Commit 33ac507

Browse files
authored
Update README.md
1 parent 58d55be commit 33ac507

File tree

1 file changed

+13
-1
lines changed

1 file changed

+13
-1
lines changed

README.md

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,19 @@ You can contact the Salesforce GSoC team at [email protected] or by openin
88
### Cloudsplaining – [salesforce/cloudsplaining](https://github.com/salesforce/cloudsplaining) ###
99
This project is open to original proposals from participants.
1010

11-
* Ideas to come
11+
* **Build a web app that identifies excessive privileges in AWS**:
12+
* Cloudsplaining can scan an AWS account or a single AWS IAM Policy - but it currently does so on command line. We’d like to turn this into a web app so developers can copy/paste their IAM policies, or upload their authorization details file, and see the results in the web app.
13+
* This will significantly lower the barrier to entry for identifying excessive privileges in AWS because developers will not have to learn a command-line tool - they will be able to use a web app instead.
14+
* This can be developed with a JavaScript framework of choice (React, Vue, Svelte, etc.).
15+
* This web app will be available to the public so anyone can use it. It will not just help Salesforce, it will help the larger security community around the world.
16+
17+
* **Enhance a REST API that provides Cloudsplaining’s IAM scanning capabilities**
18+
* Cloudsplaining’s IAM scanning capabilities are currently hosted on a REST API. Enhancing this REST API will allow the web app to be more effective and responsive.
19+
* Tech stack includes Python, FastAPI, and AWS Lambda functions. If you are comfortable with Python but not with the rest, the rest can be learned.
20+
21+
* **Build IAM Security scans into CI/CD pipelines for Infrastructure as Code**
22+
* Cloudsplaining is currently available as a command-line tool. This opportunity would include building automation using GitHub Actions to scan policies defined in Terraform and return the results on Pull Requests in GitHub.
23+
1224

1325
* **Aren't finding what you're interested in?** Look for more ideas at https://github.com/salesforce/cloudsplaining/issues
1426

0 commit comments

Comments
 (0)