Cfripper

Latest version: v1.15.6

Safety actively analyzes 629723 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 3 of 13

1.9.0

Not secure
Improvements
- CFRipper is now compatible with Python3.10
- CFRipper is now able to detect new types of wildcard usage.
- Default config will now detect lambda resource wildcards as through IAM overpowered roles.

Updates
- Bump dev dependency `moto` to allow `>=3.0.0`.

1.8.0

Not secure
Improvements
- Pin `click` to at least version `8.0.0`.
- Update `black` to `22.3.0`, and run `make format` with this new version of `black`.

1.7.1

Not secure
Fixes
- `EBSVolumeHasSSERule` can now understand `encrypted_status` if modelled as a `bool`.
- Add support to `EC2SecurityGroupOpenToWorldRule` for use cases where ports are not defined in the CloudFormation template. By default, this means all ports are included.
Updates
- Updated `EBSVolumeHasSSERule` to iterate only over `AWS::EC2::Volume` resources.
- Update `RuleConfig` documentation.
Improvements
- Bump `pycfmodel` to `0.18.0`.

1.7.0

Not secure
Updates
- Added `resource_types` to failures.

1.6.0

Not secure
Updates
- Created `GenericResourceWildcardPrincipalRule` to be an abstract for wildcard principals for Generic resources.
- Created `GenericResourcePartialWildcardPrincipalRule` and `GenericResourceFullWildcardPrincipalRule` to evaluate Generic resources.
Fixes
- Rollback `GenericWildcardPrincipalRule` as it was in `1.5.2`.

1.5.3

Not secure
Updates
- Updates `GenericWildcardPrincipalRule` to understand the `GenericResource`.
Fixes
- Stopped using `_statement_as_list()` when retrieving statements in favor of `statement_as_list()`.

Page 3 of 13

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.