smokescreen
smokescreen
smokescreen | smokescreen | |
---|---|---|
12 | 1 | |
1,038 | 31 | |
3.1% | - | |
6.5 | 0.0 | |
24 days ago | 8 months ago | |
Go | Go | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
smokescreen
-
Show HN: Lockbox: forward proxy for making third party API calls
Also from Stripe
https://github.com/stripe/smokescreen
Smokescreen is a HTTP CONNECT proxy. It proxies most traffic from Stripe to the external world (e.g., webhooks).
Smokescreen restricts which URLs it connects to:
It uses a pre-configured hostname ACL to only allow requests addressed to certain allow-listed hostnames, to ensure that no malicious code is attempting to make requests to unexpected services.
-
Launched SSRF Proxy, Access insecure URLs from your server.
It is built on Elixir/Phoenix with live view and uses https://github.com/stripe/smokescreen and nextdns in the background.
-
Show HN: ssrfproxy.com – Simple SSRF Protection
I often need to make a HTTP request to a user supplied URL, but I then need to protect myself from SSRF attacks, such as users supplying URL's to "localhost:3000/protected-thing" etc. SSRF Proxy is hopefully the simplest and quickest way to get protection. Currently there is just a Node SDK but I will generate other languages soon.
It is built on Elixir/Phoenix with live view and uses https://github.com/stripe/smokescreen and nextdns in the background.
-
Convoy (v0.8) - Open Source Webhooks Proxy - Subscriptions Filtering, Static IPs, Portal Links, and much more! 🥳 🎉
Sometimes, webhooks consumers require providers to send webhooks from predefined IP addresses. In this release, Convoy ships with an HTTP connect proxy support to route webhooks traffic through a dedicated egress. With this, we can maintain the IP address of our cluster across all requests. To configure, we deploy mole(our fork of smokescreen) and configure convoy to use this proxy with this environment variable - HTTP_PROXY
- A Server Side Request Forgery protection library for Golang
-
If you embed zero trust into your app, vulnerabilities like Spring4Shell are far less scary
Nice. Looking more at it, looks like its a mix of wireguard and smokescreen maybe?
- stripe/smokescreen: A simple HTTP proxy that fogs over naughty URLs
- Show HN: Automatic proxy setup for SSH'able boxes that have no network access
-
Introduction to OWASP Top
> "https://github.com/stripe/smokescreen"
I don't understand why they built this.
The problem described here is solved by using a firewall. What else is there to it?
- Smokescreen: A simple HTTP proxy that fogs over naughty URLs (anti-SSRF)
smokescreen
-
Practical Smokescreen - Sanitizing your outbound web requests
We've shown you examples of setting up a custom Smokescreen with password authentication. You'll find all the code for setting that up at the Fly Github repository for this Smokescreen. Have fun sanitizing your outgoing connections.
What are some alternatives?
baserunner - A tool for exploring Firebase datastores.
convoy - The Cloud Native Webhooks Gateway
mole - Mole is an HTTP connect tunnel powered by smokescreen
the-bastion - Authentication, authorization, traceability and auditability for SSH accesses.
ngx_http_ziti_module-