I hereby claim:
- I am janmasarik on github.
- I am sl4ve (https://keybase.io/sl4ve) on keybase.
- I have a public key ASDtny5-gzswBO2UP71K3YNIrwomIrthIfX9PVp9iJH09go
To claim this, I am signing this object:
#!/usr/bin/env python3 | |
import sys | |
import re | |
import datetime | |
# "kernel" of this script | |
# i use many parameters, so it's memory intensive, but i start this function recursively so i need it | |
def heart_of_script(data, which, length, string, future_destination, future_arrival_date, future_arrival_time, |
I hereby claim:
To claim this, I am signing this object:
#!/usr/bin/env python3 | |
import pickle | |
import hashlib | |
import os | |
import sys | |
class Note: | |
def __init__(self, name, date, content): | |
self.name = name | |
self.date = date |
<?php | |
include 'common.php'; | |
if ($_SERVER['REQUEST_METHOD'] === 'GET') { | |
print highlight_string(file_get_contents("execute.php"), TRUE); | |
exit(0); | |
} | |
$keys = get_keys(); |
#!/usr/bin/python3 | |
from ev3dev.ev3 import LargeMotor, ColorSensor, InfraredSensor, TouchSensor, Button, Sound | |
from time import sleep | |
from threading import Thread | |
m1 = LargeMotor('outA') | |
m2 = LargeMotor('outD') | |
cl = ColorSensor() | |
ir = InfraredSensor() |
#!/usr/bin/python3 | |
from ev3dev.ev3 import LargeMotor, ColorSensor, InfraredSensor, TouchSensor, Button, Sound | |
from time import sleep | |
from threading import Thread | |
m1 = LargeMotor('outA') | |
m2 = LargeMotor('outD') | |
cl = ColorSensor() | |
ir = InfraredSensor() |
import os | |
import requests | |
import json | |
import traceback | |
from webbrowser import open_new_tab | |
from time import sleep | |
other_client_id = os.environ["OTHER_CLIENT_ID"] # Other client id in the same project as IAP secured app | |
other_client_secret = os.environ["OTHER_CLIENT_SECRET"] # Other client secret in the same project as IAP secured app (not a secret actually) |
while read PROJECT_ID | |
do | |
SA_NAME="$PROJECT_ID@appspot.gserviceaccount.com" | |
echo "Downgrading $SA_NAME" | |
gcloud projects add-iam-policy-binding $PROJECT_ID --member "serviceAccount:$SA_NAME" --role roles/logging.logWriter | |
gcloud projects add-iam-policy-binding $PROJECT_ID --member "serviceAccount:$SA_NAME" --role roles/monitoring.metricWriter | |
gcloud projects add-iam-policy-binding $PROJECT_ID --member "serviceAccount:$SA_NAME" --role roles/monitoring.viewer | |
gcloud projects remove-iam-policy-binding $PROJECT_ID --member "serviceAccount:$SA_NAME" --role roles/editor | |
done < project_ids_to_disable_sa.txt |
apiVersion: constraints.gatekeeper.sh/v1alpha1 | |
kind: GCPIAMAllowedBindingsConstraintV3 | |
metadata: | |
name: iam-restrict-editor-on-default-sa | |
annotations: | |
description: Default service accounts should not have editor privileges | |
spec: | |
severity: high | |
match: | |
target: |