Cumulus is a service that helps you monitor and fix security weakness in realtime. The issues will be reported on web dashboard. It’s very simple and powerful.
Key features
Just install SDK to web front, can be found security weakness on service
Name | Origin | Description |
---|---|---|
XSS | SDK | When user input a xss pattern string, trigger detection of XSS |
SQLInjection | SDK | When user input a sqlinjection pattern, trigger detection of SQLInjection |
Sensitive Payload | SDK | When requesting with sensitive payload. for example, unencoded raw password |
File Upload | SDK | When user embed any file worried for system. for example, web shell |
Unnecessary Comment | Scanner | Code comments are on the served HTML or JS |
Directory Traversal | Scanner | Detect directory listing vulnerability |
Guessing | Scanner | Detect sensitive page like admin |
Unobfuscated Code | Scanner | Detect unobfuscated vulnerable codes |
If you think about able to detect additional weakness, please contribute on SDK or Scanner
The official Cumulus SDK for JavaScript, providing as npm
Note: current version is unsupported version on typescript project but we considering now and gonna make it, quickly! (#2)
To install a SDK, simply add package like belows:
npm install –save https://github.com/tophat-cloud/cumulus
yarn add https://github.com/tophat-cloud/cumulus
Setup and usage of SDK always follow the same principle.
import { protect, captureMessage } from ‘cumulus’;
protect({
key: ‘key’,
});
captureMessage(‘Hello, world!’);
If you haven’t __key__
, please sign-up and create project to get to key
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…