How I automated a full recon β secrets scan β cloud misconfiguration pipeline without writing a single parser
My usual workflow when scoping a target: run Nuclei, grep the output, manually feed interesting hosts into Trufflehog, then run Prowler if there's cloud exposure. Every step involves writing a tiny script to transform JSON from one tool into input for the next.
Those scripts break constantly β API changes, format changes, you know the drill.
I got annoyed enough to build a visual node-based workflow builder specifically for this. Each tool is a node, you wire them together, it handles the data transformation between them. Runs locally in Docker, Apache licensed, no accounts.
It's called ShipSec Studio: github.com/shipsecai/studio
Still early. Curious what tools people here would want as nodes β that would actually shape what we build next.
[link] [comments]