Cloud Security Intelligence Platform - Transform raw security scans into actionable intelligence with attack path analysis, compliance mapping, and proof-of-concept verification across AWS, Azure, GCP, and Kubernetes.
Named from Latin: nubes (cloud) + custos (guardian)
Running security scanners is easy. Understanding what the results mean is hard.
Nubicustos doesn't just run tools - it transforms raw scanner output into actionable security intelligence:
| Challenge | How Nubicustos Solves It |
|---|---|
| 24+ tools, 24+ report formats | Unified findings database with normalized severity, status, and resource mapping |
| Thousands of findings, no context | Attack path analysis correlates findings into exploitable chains |
| "Is this actually exploitable?" | Proof-of-concept commands to verify findings in your environment |
| "Are we compliant?" | Automatic mapping to 29+ compliance frameworks (CIS, SOC2, PCI-DSS, HIPAA, NIST, etc.) |
| "What changed since last scan?" | Historical tracking with MTTR metrics and trend analysis |
| "How do I fix this?" | Remediation knowledge base with AWS CLI commands and step-by-step guidance |
Nubicustos normalizes output from 24+ security tools into a single, queryable database:
- One view for all findings - No more switching between tool-specific dashboards
- Consistent severity mapping - Critical/High/Medium/Low regardless of source tool
- Resource correlation - See all findings for a specific resource across all tools
- Deduplication - Identify when multiple tools flag the same issue
Go beyond individual findings to understand how attackers could chain vulnerabilities:
- Graph-based analysis - Identifies multi-step attack chains through your infrastructure
- Entry point mapping - Shows where attackers could gain initial access
- MITRE ATT&CK integration - Maps attack paths to tactics and techniques
- Risk scoring (0-100) - Prioritize paths by exploitability and impact
- PoC generation - AWS CLI commands to verify each step is exploitable
Automatically map findings to 29+ compliance frameworks:
- AWS CIS Benchmarks (1.4, 1.5, 2.0, 2.1, 3.0)
- SOC 2, PCI-DSS 3.2.1, HIPAA
- NIST 800-53 (Rev 4 & 5), NIST 800-171, NIST CSF
- FedRAMP (Low & Moderate), CISA
- GDPR, ISO 27001, MITRE ATT&CK
- AWS Well-Architected Framework (Security & Reliability Pillars)
- And more...
Don't just report findings - prove they're exploitable:
- PoC commands - Generated AWS CLI commands to verify findings
- Secret verification - TruffleHog validates credentials are actually active
- Privilege escalation paths - PMapper shows exactly how to escalate privileges
- Exploitability scoring - Rate findings by real-world exploitability
Understand your IAM attack surface with specialized analysis:
- Privilege escalation paths - PMapper graph analysis showing all paths to admin
- Policy risk analysis - Cloudsplaining identifies overly permissive policies
- Assumed role chains - Track role assumption paths across accounts
- Lambda execution roles - Identify functions with dangerous permissions
- IMDS vulnerabilities - Find EC2 instances vulnerable to metadata attacks
Security posture over time, not just point-in-time snapshots:
- Scan comparison - See what's new, fixed, or unchanged between scans
- MTTR metrics - Mean Time To Remediation tracking
- Trend analysis - Track finding counts over time by severity
- Remediation velocity - Measure your security team's effectiveness
# 1. Clone the repository
git clone https://github.com/Su1ph3r/Nubicustos.git
cd Nubicustos
# 2. Launch the stack
docker compose up -d
# 3. Access the web interface
open http://localhost:8080
# 4. Add credentials (via UI or mount)
mkdir -p credentials/aws
cp ~/.aws/credentials credentials/aws/
cp ~/.aws/config credentials/aws/
# 5. Run your first scan
curl -X POST http://localhost:8000/api/scans \
-H "Content-Type: application/json" \
-d '{"profile": "quick", "aws_profile": "default"}'Note: Security tools run on-demand via Docker SDK - no need to pull 24+ images at startup.
┌─────────────────────────────────────────────────────────────────────────────┐
│ NUBICUSTOS │
│ Cloud Security Intelligence Platform │
├─────────────────────────────────────────────────────────────────────────────┤
│ │
│ ┌─────────────────┐ ┌─────────────────┐ ┌─────────────────┐ │
│ │ SCAN ENGINE │ │ ANALYSIS │ │ PRESENTATION │ │
│ │ │ │ │ │ │ │
│ │ • 24+ Tools │───▶│ • Normalization │───▶│ • Vue.js UI │ │
│ │ • On-demand │ │ • Attack Paths │ │ • REST API │ │
│ │ • Parallel Exec │ │ • Compliance │ │ • MCP Server │ │
│ │ • Error Track │ │ • PoC Gen │ │ • Exports │ │
│ └─────────────────┘ └─────────────────┘ └─────────────────┘ │
│ │ │ │ │
│ └──────────────────────┼──────────────────────┘ │
│ ▼ │
│ ┌─────────────────────────┐ │
│ │ DATA LAYER │ │
│ │ │ │
│ │ PostgreSQL │ Neo4j │ │
│ │ (Findings) │ (Graph) │ │
│ └─────────────────────────┘ │
└─────────────────────────────────────────────────────────────────────────────┘
| Category | Tools |
|---|---|
| Cloud Security | Prowler, ScoutSuite, CloudSploit, Pacu, CloudFox, Cloud Custodian |
| AWS Deep Dive | Enumerate-IAM, PMapper, Cloudsplaining, CloudMapper |
| Kubernetes | kube-bench, Kubescape, kube-hunter, Trivy, Grype, Polaris, Falco |
| Secrets | TruffleHog (700+ detectors), Gitleaks |
| IaC Scanning | Checkov, Terrascan, tfsec |
| Asset Mapping | Cartography (Neo4j graph) |
- Prowler - AWS security best practices and CIS benchmarks
- ScoutSuite - Multi-service security auditing
- Pacu - AWS exploitation framework for testing
- CloudFox - AWS attack surface enumeration
- Enumerate-IAM - Comprehensive IAM permission mapping
- CloudSploit - Configuration security scanning
- Cloud Custodian - Policy-based governance
- CloudMapper - AWS account visualization
- ScoutSuite - Azure security configuration review
- CloudSploit - Azure resource scanning
- Cloud Custodian - Azure policy enforcement
- Prowler - GCP security posture assessment
- ScoutSuite - GCP multi-service auditing
- CloudSploit - GCP configuration scanning
- kube-bench - CIS Kubernetes Benchmark
- Kubescape - NSA, MITRE ATT&CK frameworks
- kube-hunter - Penetration testing
- Trivy - Container vulnerability scanning
- Falco - Runtime threat detection
- Polaris - Best practices validation
- Checkov - Terraform, CloudFormation, Kubernetes, Helm
- Terrascan - Policy-as-code engine
- tfsec - Terraform security scanner
- TruffleHog - 700+ secret detectors with API verification
- Gitleaks - Fast git secrets scanner with extensive rule set
- PMapper - IAM privilege escalation path analysis
- Cloudsplaining - AWS managed policy analysis and least privilege violations
Nubicustos includes a modern Vue.js 3 web interface with 22+ specialized views:
| View | Description |
|---|---|
| Dashboard | Security posture overview with critical metrics |
| Findings | Searchable list with severity filtering and export |
| Attack Paths | Graph visualization of discovered attack chains |
| Compliance | Framework compliance status (CIS, SOC2, PCI-DSS) |
| Compliance Detail | Framework-specific control breakdown |
| Scans | Scan history, orchestration, bulk operations, and monitoring |
| Public Exposures | Exposed resources and attack surface |
| Exposed Credentials | Leaked credential detection |
| Privilege Escalation | IAM lateral movement paths |
| Privesc Paths | Detailed privilege escalation path explorer |
| Assumed Roles | IAM role assumption analysis |
| IMDS Checks | EC2 metadata service vulnerabilities |
| Lambda Analysis | Serverless security assessment |
| CloudFox | AWS enumeration results |
| Pacu | AWS exploitation findings |
| Enumerate IAM | IAM permission mapping |
| Credentials | Cloud credential profile management |
| Settings | Configuration management |
Access the frontend at http://localhost:8080 after starting the stack.
| Profile | Duration | Description |
|---|---|---|
quick |
5-10 min | Fast security assessment - Prowler only |
comprehensive |
30-60 min | Full audit with all applicable tools |
compliance-only |
15-20 min | Compliance-focused checks (Prowler + ScoutSuite) |
secrets |
2-5 min | TruffleHog + Gitleaks secrets scanning |
iam-analysis |
10-15 min | PMapper + Cloudsplaining IAM deep dive |
iac |
2-5 min | Infrastructure-as-Code scanning |
# Via API
curl -X POST http://localhost:8000/api/scans \
-H "Content-Type: application/json" \
-d '{"profile": "comprehensive", "aws_profile": "prod-audit"}'
# Via UI
# Navigate to Scans page → Quick Actions → Select profile → Start# Full audit with all tools
./scripts/run-all-audits.sh
# Quick scan (5-10 minutes)
./scripts/run-all-audits.sh --profile quick
# Comprehensive scan (30-60 minutes)
./scripts/run-all-audits.sh --profile comprehensive
# Compliance-focused scan
./scripts/run-all-audits.sh --profile compliance-only
# Filter by severity
./scripts/run-all-audits.sh --severity critical,high
# Preview without execution
./scripts/run-all-audits.sh --dry-run# Scan for exposed secrets with TruffleHog and Gitleaks
curl -X POST http://localhost:8000/api/scans \
-H "Content-Type: application/json" \
-d '{"profile": "secrets", "target_path": "/path/to/code"}'
# Query secrets findings
curl "http://localhost:8000/api/findings?tool=trufflehog"
curl "http://localhost:8000/api/findings?tool=gitleaks"Secrets Scanning Features:
- TruffleHog - 700+ secret detectors with API verification for active credentials
- Gitleaks - Fast pattern-based detection with extensive rule coverage
- Automatic secret redaction in findings (only first 4 chars shown)
- Severity mapping: Verified secrets = Critical, Cloud provider keys = High
# Analyze IAM privilege escalation paths and policy risks
curl -X POST http://localhost:8000/api/scans \
-H "Content-Type: application/json" \
-d '{"profile": "iam-analysis", "aws_profile": "your-profile"}'
# Query IAM findings
curl "http://localhost:8000/api/findings?tool=pmapper"
curl "http://localhost:8000/api/findings?tool=cloudsplaining"IAM Analysis Features:
- PMapper - Graph-based IAM privilege escalation path discovery
- Cloudsplaining - Identifies least privilege violations in IAM policies
- Risk categories: Privilege Escalation, Resource Exposure, Data Exfiltration, Infrastructure Modification
# Check all cloud provider permissions
python scripts/check-permissions.py
# Check specific provider
python scripts/check-permissions.py --provider aws
# Export with remediation instructions
python scripts/check-permissions.py --output report.md --remediation# Compare two scans with MTTR metrics
python3 report-processor/compare_scans.py \
--baseline-id abc123 \
--current-id def456 \
--include-mttr# Delete multiple scans
curl -X DELETE http://localhost:8000/api/scans/bulk \
-H "Content-Type: application/json" \
-d '{"scan_ids": ["id1", "id2", "id3"]}'
# Archive scans to downloadable ZIP
curl -X POST http://localhost:8000/api/scans/bulk/archive \
-H "Content-Type: application/json" \
-d '{"scan_ids": ["id1", "id2"]}'
# List available archives
curl http://localhost:8000/api/scans/archives
# Get per-tool error breakdown for a scan
curl http://localhost:8000/api/scans/{scan_id}/errors# Scan with specific AWS credential profile
curl -X POST http://localhost:8000/api/scans \
-H "Content-Type: application/json" \
-d '{"profile": "comprehensive", "aws_profile": "prod-audit"}'
# List available AWS profiles
curl http://localhost:8000/api/credentials/aws/profiles# Get unified findings from all tools
curl "http://localhost:8000/api/findings?severity=critical,high"
# View attack paths with risk scores
curl http://localhost:8000/api/attack-paths
# Check compliance status
curl http://localhost:8000/api/compliance
# Export findings with remediation guidance
curl http://localhost:8000/api/exports/csv -o findings.csv
# Compare scans with MTTR metrics
curl "http://localhost:8000/api/scans/compare?baseline=abc123¤t=def456"
# Get privilege escalation paths
curl http://localhost:8000/api/privesc-pathsFull API documentation available at http://localhost:8000/docs (Swagger UI).
Integrate Nubicustos with Claude, GPT, or other LLMs via the Model Context Protocol:
{
"mcpServers": {
"nubicustos": {
"command": "python",
"args": ["-m", "nubicustos_mcp.server"],
"env": {
"NUBICUSTOS_MCP_API_URL": "http://localhost:8000"
}
}
}
}Ask natural language questions about your security posture:
- "What are the most critical findings in my AWS account?"
- "Show me all privilege escalation paths to admin"
- "Are we compliant with CIS 2.0?"
- "What attack paths exist from public-facing resources?"
| Category | Tools |
|---|---|
| Scan Management | list_scans, trigger_scan, get_scan_status, cancel_scan |
| Finding Queries | search_findings, get_findings_summary, get_finding_details |
| Attack Paths | list_attack_paths, analyze_attack_paths, list_privesc_paths |
| AWS Security | get_imds_checks, get_lambda_analysis, run_cloudfox |
| Exports | export_findings, get_export_summary |
| Bulk Operations | bulk_delete_scans, bulk_archive_scans |
| Error Analysis | get_scan_errors, get_tool_status |
| Archives | list_archives, download_archive |
| Assumed Roles | analyze_assumed_roles, list_role_chains |
See MCP Server Guide for setup instructions.
| Document | Description |
|---|---|
| Installation Guide | Detailed setup instructions |
| Cheatsheet | Quick reference for common commands |
| MCP Server Guide | LLM integration via Model Context Protocol |
| Architecture | Detailed architecture documentation |
| Contributing | How to contribute to the project |
| Changelog | Version history and release notes |
| Requirement | Minimum | Recommended |
|---|---|---|
| Docker Engine | 20.10+ | Latest |
| Docker Compose | 2.0+ | Latest |
| RAM | 16GB | 32GB |
| Disk Space | 50GB | 100GB |
| Port | Service | Description |
|---|---|---|
| 8080 | Nginx | Web frontend |
| 8000 | FastAPI | REST API |
| 5432 | PostgreSQL | Findings database |
| 7474 | Neo4j HTTP | Graph browser |
| 7687 | Neo4j Bolt | Graph queries |
We welcome contributions! See CONTRIBUTING.md for guidelines.
Found a vulnerability? Please use GitHub's private vulnerability reporting or email maintainers directly. Do not open public issues for security concerns.
- Path Traversal Protection - All file operations validated with
os.path.realpath()to prevent directory escape - Zip Slip Prevention - Archive extraction secured against path manipulation attacks
- ReDoS Mitigation - Input length limits on regex patterns to prevent denial of service
- Log Sanitization - Credentials, tokens, and IP addresses automatically redacted from logs
- Error Information Control - Limited validation error details to prevent schema disclosure
- SQLAlchemy Error Handling - Specific exception handling to prevent information leakage
MIT License - see LICENSE for details.
Nubicustos builds on these excellent open-source security tools:
| Tool | Purpose | License |
|---|---|---|
| Prowler | Cloud Security Posture Management | Apache-2.0 |
| ScoutSuite | Multi-cloud security auditing | GPL-2.0 |
| Kubescape | Kubernetes security platform | Apache-2.0 |
| kube-bench | CIS Kubernetes Benchmark | Apache-2.0 |
| Trivy | Container vulnerability scanner | Apache-2.0 |
| Checkov | IaC security scanner | Apache-2.0 |
| Falco | Runtime threat detection | Apache-2.0 |
| Cartography | Asset inventory mapping | Apache-2.0 |
| TruffleHog | Secrets detection with verification | AGPL-3.0 |
| Gitleaks | Git secrets scanner | MIT |
| PMapper | IAM privilege escalation analysis | AGPL-3.0 |
| Cloudsplaining | AWS IAM policy analysis | BSD-3-Clause |
See NOTICE for full attribution.
- IBM Cloud support
- SIEM platform integration
- Slack/Teams notifications
- Automated scheduled scanning
- Multi-tenancy support
Turn security scanner noise into actionable intelligence.