Airflowscan : Checklist & Tools For Increasing Security Of Apache Airflow

Airflowscan is a checklist and tools for increasing security of Apache Airflow. The purpose of this project is provide tools to increase security of Apache Airflow installations. This projects provides the following tools:

  • Configuration file with hardened settings
  • Security checklist for hardening default installations
  • Static analysis tool to check Airflow configuration files for insecure settings.
  • JSON schema document used for validation by the static analysis tool

The static analysis tool can check an Airflow configuration file for settings related to security. The tool convers the config file to JSON, and then uses a JSON Schema to do the validation.

Requirements

Python 3 is required and you can find all required modules in the requirements.txt file. Only tested on Python 3.7 but should work on other 3.x releases. No plans to 2.x support at this time.

Also Read – Sampler : A Tool For Shell Commands Execution, Visualization & Alerting

Installation

You can install this via PIP as follows:

pip install airflowscan
airflowscan

To download and run manually, do the following:

git clone https://github.com/nightwatchcybersecurity/airflowscan.git
cd airflowscan
pip -r requirements.txt
python -m airflowscan.cli

How to use

To scan a configuration file, do the following command:

airflowscan scan some_airflow.cfg

Disclaimer

This project NOT AFFILIATED with the Apache Foundation and the Airflow project, and is not endorsed by them.

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

15 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

15 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

15 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

15 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

16 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

18 hours ago