Automated GitHub Scanner for Exposed AWS Keys

somdn_product_page

This n8n workflow automates the detection of exposed AWS IAM access keys in GitHub repositories, providing security teams with rapid alerts and actionable insights. It begins with a manual trigger to start the process, then iterates through AWS users to retrieve their access keys. The workflow filters for active keys only, constructs targeted GitHub searches to find exposed keys, and aggregates the search results to identify potential compromises. If exposed keys are found, it generates detailed security reports outlining the risk levels, repositories involved, and recommended remediation steps. Alerts are sent via Slack, enabling quick response to security incidents. Additionally, there are provisions for automating the disabling of compromised keys, enhancing reactive security measures. This workflow is ideal for continuous security monitoring, ensuring sensitive credentials are not exposed to public repositories and promptly alerting security teams to take necessary actions.

Node Count

11 – 20 Nodes

Nodes Used

code, httpRequest, if, manualTrigger, noOp, slack, splitInBatches, stickyNote, wait

Reviews

There are no reviews yet.

Be the first to review “Automated GitHub Scanner for Exposed AWS Keys”

Your email address will not be published. Required fields are marked *