Skip to content
View wakeful's full-sized avatar
⛰️
bofh with cloud habit...
⛰️
bofh with cloud habit...

Sponsoring

@FFmpeg
@ziglang

Highlights

  • Pro

Organizations

@variHQ @ShadowRealmTools

Block or report wakeful

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
wakeful/README.md

Cześć 👋

Security engineer with 19+ years across fintech, startups, and F1 - open-sourcing tools that surface IAM trust paths and cloud misconfigs.

Focus Areas

  • 🔒 Security Engineering - IAM trust-path analysis, red & purple team work + tooling, cloud recon
  • 📊 Observability & Data - eBPF, continuous profiling, OTel, LGTM stack, ClickHouse
  • 🛠️ Infrastructure - Kubernetes, OpenTofu/Terragrunt, GitOps
  • 🤖 AI Agents - building lightweight automation and custom LLM tooling

Tooling

🔐 Cloud Security

Project Lang Description
spark Go Cloud recon - find publicly exposed AWS resources
trick Go Effortless AWS persistence via AssumeRole - red team credential rotation
veil Go Map hidden trust paths in your AWS IAM before they become security risks

🛡️ Supply Chain Security

Project Lang Description
lock Rust Safely pin GitHub Actions to commit SHAs

🧰 Developer Tools

Project Lang Description
atlantis-gen-yaml Go Generate Atlantis project configs from Terragrunt files
aws-console Go Open the AWS Console from your CLI credentials, instantly
echo Rust Minimal WebFinger (RFC 7033) on Cloudflare Workers
uddf2vid Rust Telemetry HUD overlay for dive footage, parsed from UDDF logs
yaml2json Go Fast YAML → JSON converter

Pinned Loading

  1. trick trick Public

    Tactician of Role-Interchanging Cloud Keys (Effortless AWS persistence via AssumeRole).

    Go 1

  2. veil veil Public

    Verified Entity Identity Lock (Expose hidden trust paths in your AWS IAM setup before they become security risks.)

    Go 15

  3. spark spark Public

    Seeking Public AWS Resources and Kernels.

    Go 1

  4. lock lock Public

    A lightweight CLI to safely update and pin GitHub Actions to exact commit SHAs.

    Rust

  5. aws-console aws-console Public

    aws-console automatically opens the AWS Management Console.

    Go 1