rsora / hidi

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

hidi: Command line tool to obfuscate AWS files of any sort

Usage:

go run . [-s <your-salt-string>] < original.txt > scrambled.txt

Flags:
  -c value
        (c)ustom replace keyword in the form target:replacement
  -s string
        (s)alt passed to aws ids scramble functions (default "14")

The -s flag contains the salt that will be passed to hash functions that scramble the aws ids. This variable will be exposed as flag to allow to keep the same salt on multiple command runs allowing to have multiple files that remains with same ids if scrambled with the same salt (think about having multiple billing files for the same aws account or multiple placebo files for the same test session)

Why?

I need a tool that allows me to safely publish any data coming from an AWS accounts without the worry of leaking sensitive information

List of AWS data containing potential sensitive information:

  • billing files like the AWS CUR
  • placebo files used for testing, as they are recordings of actual api calls to AWS, and could leak account sensitive informations
  • ?

How AWS sensitive data looks like?

Even if it seems things like

  • Account ID
  • Resources ID (like i-10bf43c2be699e77a, ami-b0c6444b, ...) are NOT considered sensitive (read here (2022-02-16) )

I would prefer to keep certain things not disclosed to avoid issues and respect sone sort of "least disclosed" principle (read here (2018-08-29)) and let YOU decide if it's necessary to share certain info with the rest of the world.

How?

The idea is to have a brute file parser that scans files line by line applying heuristics (probably regexes) to find sensitive data and scramble it, maintaining it compatible with AWS standards.

About


Languages

Language:Go 100.0%