You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Refine Operational Security role with redaction and better validation
- Implemented credential redaction in `CloudSecurityAI` to avoid exposing full secrets.
- Added robust error handling and type validation to Flask security endpoints.
- Refactored `OfficialAssistance.jsx` to move tool configurations into a declarative structure.
- Replaced realistic-looking simulated credentials with obviously fake ones.
- Updated unit tests to verify redaction logic.
Co-authored-by: GYFX35 <134739293+GYFX35@users.noreply.github.com>
{id: 'opsec_analyzer',name: 'OpSec Analyzer',icon: '🕵️',desc: 'AI-driven analysis of operational logs for procedural threats.'}
39
+
{
40
+
id: 'cloud_guard',
41
+
name: 'Cloud Guard',
42
+
icon: '☁️',
43
+
desc: 'AI scanner for leaked credentials and sensitive cloud data.',
44
+
endpoint: '/analyze/cloud',
45
+
getPayload: ()=>({content: "Cloud scan simulation with fake AWS key: AKIA0000000000000000 and fake Google API Key: AIza00000000000000000000000000000000000"})
46
+
},
47
+
{
48
+
id: 'iot_shield',
49
+
name: 'IoT Shield',
50
+
icon: '🌐',
51
+
desc: 'Real-time anomaly detection for industrial IoT networks.',
0 commit comments