❌

Normal view

Received yesterday β€” 6 March 2026 ⏭ /r/netsec - Information Security News & Discussion

How I automated a full recon β†’ secrets scan β†’ cloud misconfiguration pipeline without writing a single parser

My usual workflow when scoping a target: run Nuclei, grep the output, manually feed interesting hosts into Trufflehog, then run Prowler if there's cloud exposure. Every step involves writing a tiny script to transform JSON from one tool into input for the next.

Those scripts break constantly β€” API changes, format changes, you know the drill.

I got annoyed enough to build a visual node-based workflow builder specifically for this. Each tool is a node, you wire them together, it handles the data transformation between them. Runs locally in Docker, Apache licensed, no accounts.

It's called ShipSec Studio: github.com/shipsecai/studio

Still early. Curious what tools people here would want as nodes β€” that would actually shape what we build next.

submitted by /u/Deep-Bandicoot-7090
[link] [comments]
❌