bug-bounty166
google162
microsoft149
facebook122
apple108
web390
exploit57
open-source44
ai-agents36
docker34
malware33
react27
supply-chain26
aws25
dos24
rce21
automation20
cloudflare20
cve20
tool19
machine-learning18
account-takeover18
authentication-bypass17
llm17
node17
idor16
wordpress16
browser16
sql-injection16
code-generation15
access-control15
rust15
kubernetes14
opinion14
privacy14
phishing14
infrastructure14
reverse-engineering13
claude13
software-engineering13
burp-suite12
bragging-post12
privilege-escalation12
api-security12
developer-tools12
authentication12
writeup12
web-security11
prompt-injection11
ai-security11
0
7/10
Introduces an open-source approach using Cartography to map production AI agents to their IAM roles, declared tools, models, and network exposure in AWS infrastructure. Provides graph-based queries and methodology to discover which agents are internet-reachable and what permissions they hold, addressing a critical gap in AI security visibility.
ai-agent-security
iam-mapping
cloud-security
container-security
aws-security
threat-modeling
infrastructure-graph
agent-discovery
network-exposure
cartography
aibom
governance
ecs
ecr
langchain
pydantic-ai
Cartography
Alex Chantavy
Cisco AIBOM
AWS ECS
AWS ECR
AWS IAM
pydantic_ai
langchain
OpenAI
EU AI Act
NIST AI RMF