Skip to content

Framework for Unified Flaw & Fault Auditing The ultimate AWS Cloud Security Audit Framework that makes security auditing so easy, you can do it even when you're sleepy!

License

Notifications You must be signed in to change notification settings

Masriyan/FuFuFaFa

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

FuFuFaFa Banner

πŸ›‘οΈ FuFuFaFa Framework

License Last Commit Issues PyPI Python

Framework for Unified Flaw & Fault Auditing
The ultimate AWS Cloud Security Audit Framework that makes security auditing so easy, you can do it even when you're sleepy! 😴

Key Features β€’ How It Works β€’ Installation β€’ Quick Start β€’ Usage Guide β€’ Contributing


🌟 Key Features

πŸ” Secret Leak Detection

Scan repositories for hardcoded credentials with over 50+ patterns including AWS keys, API tokens, and private keys. Includes Shannon entropy detection.

☁️ AWS Misconfiguration

Comprehensive checks for S3, EC2, IAM, RDS, Lambda, VPC, and CloudTrail to ensure your cloud infrastructure follows best practices.

πŸ“œ IaC Scanning

Analyze Terraform, CloudFormation, Serverless, and Kubernetes files for security flaws before deployment using the Checkov engine.

πŸ‘€ IAM Permission Analysis

Visualize and analyze IAM permissions to detect privilege escalation paths and overly permissive policies using graph-based mapping.


πŸ”„ How It Works

FuFuFaFa streamlines your security auditing workflow. Here is the process flow:

graph TD
    A[Start Scan] --> B{Select Scan Type}
    
    B -->|Secrets| C[Cloning Repository]
    C --> D[Regex & Entropy Analysis]
    D --> E[Git History Scan]
    
    B -->|Cloud| F[AWS API Calls]
    F --> G[Resource Enumeration]
    G --> H[Security Rule Check]
    
    B -->|IaC| I[Parse Infrastructure Code]
    I --> J[Checkov Policy Scan]
    
    B -->|IAM| K[Fetch IAM Policies]
    K --> L[Neo4j Graph Building]
    L --> M[Privilege Path Analysis]
    
    E --> N[Generate Report]
    H --> N
    J --> N
    M --> N
    
    N --> O((End))
    
    style A fill:#4F46E5,stroke:#333,stroke-width:2px,color:#fff
    style N fill:#10B981,stroke:#333,stroke-width:2px,color:#fff
    style O fill:#EF4444,stroke:#333,stroke-width:2px,color:#fff
Loading

πŸš€ Installation

Prerequisites

  • Python 3.9+
  • Docker & Docker Compose (for persistent storage)
  • AWS CLI configured (for cloud scanning)

Quick Install

# 1. Clone the repository
git clone https://github.com/Masriyan/FuFuFaFa.git
cd FuFuFaFa

# 2. Set up virtual environment
python -m venv .venv
source .venv/bin/activate  # On Windows: .venv\Scripts\activate

# 3. Install dependencies
pip install -e ".[dev]"

# 4. Start database services
docker-compose up -d postgres redis neo4j

# 5. Initialize database
fufufafa init-db

⚑ Quick Start

Get up and running in seconds!

# 1. Verify installation
fufufafa --version

# 2. Run a secret scan on a local repo
fufufafa secret scan ./your-project

# 3. Scan your default AWS profile
fufufafa cloud scan

# 4. View help for more commands
fufufafa --help

πŸ“– Usage Guide

πŸ•΅οΈ Secret Scanning

Find hidden secrets in your code, even deep in git history.

fufufafa secret scan ./target-repo --history

Options:

  • --history: Scan full git history
  • --entropy 4.5: Set custom entropy threshold
  • --json: Output results in JSON format

☁️ Cloud Auditing

Audit your AWS environment for security gaps.

fufufafa cloud scan --profile production --regions us-east-1,us-west-2

Options:

  • --profile: Specify AWS CLI profile
  • --services s3,ec2,iam: Contextual scanning
  • --fix: Attempt auto-remediation (Use with caution!)

πŸ—οΈ IaC Security

Shift left by scanning your infrastructure code.

fufufafa iac scan ./terraform-files

πŸ•ΈοΈ IAM Analysis

Visualize permission paths and find dangerous roles.

fufufafa iam analyze --graph

Note: Requires Neo4j service to be running.


πŸ—οΈ Architecture

The FuFuFaFa framework is built for modularity and scalability.

C4Context
    title System Context Diagram for FuFuFaFa

    Person(user, "Security Auditor", "Uses FuFuFaFa to audit cloud security.")
    System(fufufafa, "FuFuFaFa Framework", "CLI tool for scanning secrets, cloud config, IaC, and IAM.")
    
    System_Ext(aws, "AWS Cloud", "Target environment for auditing.")
    System_Ext(neo4j, "Neo4j Database", "Stores IAM graph relationships.")
    System_Ext(postgres, "PostgreSQL", "Stores finding results and reports.")
    
    Rel(user, fufufafa, "Runs CLI commands")
    Rel(fufufafa, aws, "Reads configuration via API")
    Rel(fufufafa, neo4j, "Queries/Updates Graph")
    Rel(fufufafa, postgres, "Persists Audit Data")
Loading

🀝 Community & Support

We welcome contributions! Please see our Contributing Guide for details.


Made with ❀️ and β˜• by the FuFuFaFa Team

About

Framework for Unified Flaw & Fault Auditing The ultimate AWS Cloud Security Audit Framework that makes security auditing so easy, you can do it even when you're sleepy!

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

No packages published