Skip to content

Commit ce2c2b9

Browse files
committed
Released version 0.1.4
1 parent 32d1383 commit ce2c2b9

File tree

3 files changed

+22
-8
lines changed

3 files changed

+22
-8
lines changed

connection.yml.sample

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,8 @@ sources:
3535
user: YOUR_MYSQL_USERNAME
3636
password: YOUR_MYSQL_PASSWORD
3737
database: YOUR_MYSQL_DATABASE_NAME
38-
postgresql: # New PostgreSQL configuration
39-
postgresql_profile:
38+
postgresql:
39+
postgresql1:
4040
host: YOUR_POSTGRESQL_HOST
4141
port: YOUR_POSTGRESQL_PORT
4242
user: YOUR_POSTGRESQL_USERNAME

readme.md

Lines changed: 18 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
<img alt="Static Badge" src="https://img.shields.io/badge/Supports-S3-yellow?logo=amazons3">
66
<img alt="Static Badge" src="https://img.shields.io/badge/Supports-GCP-red?logo=googlecloud">
77
<img alt="Static Badge" src="https://img.shields.io/badge/Supports-MysQL-green?logo=mysql">
8+
<img alt="Static Badge" src="https://img.shields.io/badge/Supports-PostgreSQL-blue?logo=postgresql">
89
<img alt="Static Badge" src="https://img.shields.io/badge/Supports-Redis-red?logo=redis">
910
<img alt="Static Badge" src="https://img.shields.io/badge/Supports-On Prem-black?logo=amazonec2">
1011
</p>
@@ -14,7 +15,7 @@
1415

1516
### 🦅 HAWK Eye - Highly Advanced Watchful Keeper Eye
1617

17-
HAWK Eye is a powerful and versatile CLI (Command-Line Interface) tool designed to be your vigilant watchkeeper, guarding against potential data breaches and cyber threats across various platforms. Inspired by the precision and vision of majestic birds of prey, HAWK Eye swiftly scans multiple data sources, including S3, MySQL, Redis, Firebase, filesystem, and Google Cloud buckets (GCS), for Personally Identifiable Information (PII) and secrets.
18+
HAWK Eye is a powerful and versatile CLI (Command-Line Interface) tool designed to be your vigilant watchkeeper, guarding against potential data breaches and cyber threats across various platforms. Inspired by the precision and vision of majestic birds of prey, HAWK Eye swiftly scans multiple data sources, including S3, MySQL, PostgreSQL, Redis, Firebase, filesystem, and Google Cloud buckets (GCS), for Personally Identifiable Information (PII) and secrets.
1819

1920

2021
### Why "HAWK Eye"?
@@ -64,10 +65,10 @@ HAWK Eye is a Python-based CLI tool that can be installed using the following st
6465
<div id="features">
6566

6667
## Key features
67-
- Swiftly scans multiple data sources (S3, MySQL, Redis, Firebase, filesystem, and GCS) for PII data and malware exposure.
68+
- Swiftly scans multiple data sources (S3, MySQL, PostgreSQL, Redis, Firebase, filesystem, and GCS) for PII data and malware exposure.
6869
- Advanced algorithms and deep scanning capabilities provide thorough security auditing.
6970
- Real-time alerts and notifications keep you informed of potential data vulnerabilities using Slack and other integrations, with more coming soon.
70-
- New command support for S3, MySQL, Redis, Firebase, filesystem, and GCS expands the tool's capabilities.
71+
- New command support for S3, MySQL, PostgreSQL, Redis, Firebase, filesystem, and GCS expands the tool's capabilities.
7172
- ``--debug`` flag enables printing of all debugging output for comprehensive troubleshooting.
7273
- Save output in JSON format using the --json flag and specify a file name like --json output.json.
7374
- Proudly crafted with love and a sense of humor to make your security journey enjoyable and stress-free.
@@ -77,7 +78,7 @@ HAWK Eye is a Python-based CLI tool that can be installed using the following st
7778
To unleash the power of HAWK Eye, simply follow the steps mentioned in the "Usage" section of the "README.md" file.
7879

7980
### Options
80-
Note: If you don't provide any command, it will run all commands (firebase, fs, gcs, mysql, redis, s3) by default.
81+
Note: If you don't provide any command, it will run all commands (firebase, fs, gcs, mysql, postgresql, redis, s3) by default.
8182
<table>
8283
<thead>
8384
<tr>
@@ -110,6 +111,11 @@ Note: If you don't provide any command, it will run all commands (firebase, fs,
110111
mysql
111112
<td>Scan MySQL profiles for PII and secrets data.</td>
112113
</tr>
114+
<tr>
115+
<td>
116+
postgresql
117+
<td>Scan postgreSQL profiles for PII and secrets data.</td>
118+
</tr>
113119
<tr>
114120
<td>
115121
redis
@@ -198,6 +204,14 @@ sources:
198204
user: YOUR_MYSQL_USERNAME
199205
password: YOUR_MYSQL_PASSWORD
200206
database: YOUR_MYSQL_DATABASE_NAME
207+
208+
postgresql:
209+
postgresql1:
210+
host: YOUR_POSTGRESQL_HOST
211+
port: YOUR_POSTGRESQL_PORT
212+
user: YOUR_POSTGRESQL_USERNAME
213+
password: YOUR_POSTGRESQL_PASSWORD
214+
database: YOUR_POSTGRESQL_DATABASE_NAME
201215

202216
fs:
203217
fs1:

setup.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
VERSION = "0.1.3"
1+
VERSION = "0.1.4"
22

33
from setuptools import setup, find_packages
44

@@ -11,7 +11,7 @@
1111
setup(
1212
name='hawk_scanner',
1313
version=VERSION,
14-
description='A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.',
14+
description='A powerful scanner to scan your Filesystem, S3, MySQL, PostgreSQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.',
1515
long_description=long_description,
1616
long_description_content_type="text/markdown",
1717
url='https://github.com/rohitcoder/hawk-eye',

0 commit comments

Comments
 (0)