Glasswall Engine is an CDR (Content Disarm and Reconstruction) product, and we need a number of security researchers and developers to work with us on on our forthcoming 'Serverless proxy' solution.
Here is an example of the types of tasks that you would be involved in:
- Create 'exploit files' using metasploit (that trigger RCE when seen or opened)
- Find old image exploits, run them on insecure OS, and confirm that gw-proxy makes them safe (to process files using Glasswall Rebuild engine you can use the Docker image, or the SaaS API)
- Create polyglot files using python
- Create lambda function that creates Polyglot files lambda python security
- Show malware files being successfully rebuilt safely using GW-Proxy gw-proxy lambda security
- Proactivity and ability to just 'get on with it', are key requirements
- Since the cost of running this type of gw-proxy capability is going to be (in most cases) less that $0.1, the expectation is that the developer can use its own AWS environment
- All work to be coordinated using GitHub and Slack
- All changes to be summited using Pull Requests
- When possible, use the OWASP SBot python APIs.
About the recuiterMember since May 20, 2018 Prateak Kumar
from Diekirch, Luxembourg