Skip to content

Commit 98ffbcd

Browse files
committed
chore(integrations): more integrations
1 parent 92b3317 commit 98ffbcd

File tree

7 files changed

+2388
-5
lines changed

7 files changed

+2388
-5
lines changed

apps/app/src/app/(app)/[orgId]/integrations/data/categories/cloud.ts

Lines changed: 220 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,4 +134,224 @@ export const cloudIntegrations: Integration[] = [
134134
],
135135
setupHint: 'Requires Pulumi access token',
136136
},
137+
{
138+
id: 'aws-cloudtrail',
139+
name: 'AWS CloudTrail',
140+
domain: 'aws.amazon.com',
141+
description: 'AWS API activity logging',
142+
category: 'Cloud Security',
143+
popular: true,
144+
examplePrompts: [
145+
'Query CloudTrail for admin actions',
146+
'Check recent API calls',
147+
'Verify trail configurations',
148+
],
149+
setupHint: 'Requires AWS credentials with CloudTrail access',
150+
},
151+
{
152+
id: 'aws-config',
153+
name: 'AWS Config',
154+
domain: 'aws.amazon.com',
155+
description: 'AWS resource configuration tracking',
156+
category: 'Cloud Security',
157+
examplePrompts: [
158+
'Get AWS Config compliance status',
159+
'Check resource configurations',
160+
'Verify config rules',
161+
],
162+
setupHint: 'Requires AWS Config API access',
163+
},
164+
{
165+
id: 'aws-guardduty',
166+
name: 'AWS GuardDuty',
167+
domain: 'aws.amazon.com',
168+
description: 'AWS threat detection service',
169+
category: 'Cloud Security',
170+
examplePrompts: [
171+
'Get GuardDuty findings',
172+
'Check threat intelligence',
173+
'Verify detector status',
174+
],
175+
setupHint: 'Requires AWS GuardDuty access',
176+
},
177+
{
178+
id: 'aws-inspector',
179+
name: 'AWS Inspector',
180+
domain: 'aws.amazon.com',
181+
description: 'Automated security assessment',
182+
category: 'Cloud Security',
183+
examplePrompts: ['Get Inspector assessment runs', 'Check findings', 'Verify scan coverage'],
184+
setupHint: 'Requires AWS Inspector API access',
185+
},
186+
{
187+
id: 'aws-macie',
188+
name: 'AWS Macie',
189+
domain: 'aws.amazon.com',
190+
description: 'Data security and privacy service',
191+
category: 'Cloud Security',
192+
examplePrompts: [
193+
'Get Macie sensitive data findings',
194+
'Check S3 bucket security',
195+
'Verify data classification',
196+
],
197+
setupHint: 'Requires AWS Macie access',
198+
},
199+
{
200+
id: 'gcp-cloud-armor',
201+
name: 'GCP Cloud Armor',
202+
domain: 'cloud.google.com',
203+
description: 'DDoS protection and WAF',
204+
category: 'Cloud Security',
205+
examplePrompts: [
206+
'Get Cloud Armor security policies',
207+
'Check threat intelligence',
208+
'Verify rate limiting rules',
209+
],
210+
setupHint: 'Requires GCP Compute API access',
211+
},
212+
{
213+
id: 'gcp-access-transparency',
214+
name: 'GCP Access Transparency',
215+
domain: 'cloud.google.com',
216+
description: 'Google Cloud access logging',
217+
category: 'Cloud Security',
218+
examplePrompts: [
219+
'Get Access Transparency logs',
220+
'Check admin access events',
221+
'Verify transparency scope',
222+
],
223+
setupHint: 'Requires GCP Logging API access',
224+
},
225+
{
226+
id: 'azure-defender',
227+
name: 'Microsoft Defender for Cloud',
228+
domain: 'azure.microsoft.com',
229+
description: 'Cloud workload protection',
230+
category: 'Cloud Security',
231+
popular: true,
232+
examplePrompts: [
233+
'Get Defender for Cloud alerts',
234+
'Check security recommendations',
235+
'Verify protection coverage',
236+
],
237+
setupHint: 'Requires Azure Security Center access',
238+
},
239+
{
240+
id: 'azure-sentinel',
241+
name: 'Microsoft Sentinel',
242+
domain: 'azure.microsoft.com',
243+
description: 'Cloud-native SIEM',
244+
category: 'Cloud Security',
245+
examplePrompts: [
246+
'Query Sentinel for security incidents',
247+
'Check hunting queries',
248+
'Verify data connectors',
249+
],
250+
setupHint: 'Requires Azure Sentinel API access',
251+
},
252+
{
253+
id: 'azure-policy',
254+
name: 'Azure Policy',
255+
domain: 'azure.microsoft.com',
256+
description: 'Azure governance and compliance',
257+
category: 'Cloud Security',
258+
examplePrompts: [
259+
'Get Azure Policy compliance state',
260+
'Check policy assignments',
261+
'Verify initiative definitions',
262+
],
263+
setupHint: 'Requires Azure Policy Reader role',
264+
},
265+
{
266+
id: 'alibaba-cloud',
267+
name: 'Alibaba Cloud',
268+
domain: 'alibabacloud.com',
269+
description: 'Cloud computing services',
270+
category: 'Cloud Security',
271+
examplePrompts: [
272+
'Get Alibaba Cloud security alerts',
273+
'Check resource configurations',
274+
'Verify access controls',
275+
],
276+
setupHint: 'Requires Alibaba Cloud API credentials',
277+
},
278+
{
279+
id: 'oracle-cloud',
280+
name: 'Oracle Cloud',
281+
domain: 'oracle.com',
282+
description: 'Oracle cloud infrastructure',
283+
category: 'Cloud Security',
284+
examplePrompts: [
285+
'Get Oracle Cloud security findings',
286+
'Check compartment policies',
287+
'Verify network security',
288+
],
289+
setupHint: 'Requires Oracle Cloud API access',
290+
},
291+
{
292+
id: 'ibm-cloud',
293+
name: 'IBM Cloud',
294+
domain: 'ibm.com',
295+
description: 'IBM cloud services and security',
296+
category: 'Cloud Security',
297+
examplePrompts: [
298+
'Get IBM Cloud security events',
299+
'Check resource configurations',
300+
'Verify access policies',
301+
],
302+
setupHint: 'Requires IBM Cloud API key',
303+
},
304+
{
305+
id: 'linode',
306+
name: 'Linode',
307+
domain: 'linode.com',
308+
description: 'Cloud infrastructure provider',
309+
category: 'Cloud Security',
310+
examplePrompts: [
311+
'List Linode instances',
312+
'Check firewall rules',
313+
'Verify backup configurations',
314+
],
315+
setupHint: 'Requires Linode API token',
316+
},
317+
{
318+
id: 'vultr',
319+
name: 'Vultr',
320+
domain: 'vultr.com',
321+
description: 'Cloud compute platform',
322+
category: 'Cloud Security',
323+
examplePrompts: ['Get Vultr server list', 'Check firewall groups', 'Verify SSH key management'],
324+
setupHint: 'Requires Vultr API key',
325+
},
326+
{
327+
id: 'scaleway',
328+
name: 'Scaleway',
329+
domain: 'scaleway.com',
330+
description: 'European cloud provider',
331+
category: 'Cloud Security',
332+
examplePrompts: ['List Scaleway instances', 'Check security groups', 'Verify IAM policies'],
333+
setupHint: 'Requires Scaleway API token',
334+
},
335+
{
336+
id: 'ovhcloud',
337+
name: 'OVHcloud',
338+
domain: 'ovhcloud.com',
339+
description: 'European cloud infrastructure',
340+
category: 'Cloud Security',
341+
examplePrompts: [
342+
'Get OVHcloud resource inventory',
343+
'Check network configurations',
344+
'Verify access controls',
345+
],
346+
setupHint: 'Requires OVHcloud API credentials',
347+
},
348+
{
349+
id: 'hetzner',
350+
name: 'Hetzner Cloud',
351+
domain: 'hetzner.com',
352+
description: 'European cloud hosting',
353+
category: 'Cloud Security',
354+
examplePrompts: ['List Hetzner Cloud servers', 'Check firewall rules', 'Verify SSH key usage'],
355+
setupHint: 'Requires Hetzner Cloud API token',
356+
},
137357
];

0 commit comments

Comments
 (0)